Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.
The new U.K. law mandates that manufacturers apply several security controls to their connected devices.
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.
The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.
The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.
The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.
A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn't going away anytime soon.
The newest version of the sLoad malware dropper comes equipped with infection tracking capabilities and an anti-analysis trick.
More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.
Citrix has issued the first of several updates fixing a critical vulnerability in various versions of its Citrix Application Delivery Controller (ADC) and Citrix Gateway products.
New versions of the ransomware now sniff out saved credentials for Internet Explorer, Mozilla Firefox, Mozilla Thunderbird, Google Chrome and Microsoft Outlook.
Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.
Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?
Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.
The flaws affect a key tool for managing its network platform and switches.
Two proof-of-concept exploits were publicly released for the major Microsoft crypto-spoofing vulnerability.
Threatpost talks to Venafi about the recently-disclosed Microsoft vulnerability and whether the hype around the flaw was warranted.
Class members have until Jan. 22, next week, to claim benefits.
The flaw, in Intel VTune Profiler, could enable privilege escalation.
Overall Adobe patched nine flaws in Illustrator CC and Experience Manager.