Like NotPetya, it overwrites the master boot record to render computers "trashed."
A spate of phishing attacks have promised financial relief due to the coronavirus pandemic - but in reality swiped victims' credentials, payment card data and more.
A second vulnerability could be used to prevent access to almost all of a site’s existing content, by simply redirecting visitors.
The zero-day Zoom flaws could give local, unprivileged attackers root privileges, and allow them to access victims’ microphone and camera.
An effective spoofing campaign promises users important information about new coronavirus cases in their local area, scooting past Proofpoint and Microsoft Office 356 ATPs.
About 10 compromised websites employ a multi-stage, targeted effort to fingerprint and compromise victims.
The New York Attorney General has inquired about Zoom's data security strategy, as the conferencing platform comes under heavy scrutiny for its privacy policies.
An old RAT learns an old trick.
The second breach in less than 24 months stemmed from employee account compromises.
An informal Threatpost reader poll shows the majority of site visitors are privacy absolutists. But attitudes shift when the trade off is saving lives.
Phishing and zero-days continue to be a core part of the APT arsenal.
Zoom removed its Facebook SDK for iOS feature after a report found the app sending Facebook "unnecessary" user data.
The malware is back after three years, looking to cash in on interest in government relief efforts around coronavirus.
The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.
CVE-2020-10245, a heap-based buffer overflow that rates 10 out of 10 in severity, exists in the CODESYS web server and takes little skill to exploit.
The food container company's main website had a card skimmer that scooped up online customers' payment card data.
The malware, the work of a new APT called TwoSail Junk, allows deep surveillance and total control over iOS devices.
Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.
The router DNS hijacking attacks have targeted more than a thousand victims with the Oski info-stealing malware.
With more employees than ever working remotely, there are numerous potential threats that organizations must be aware of.