Update now! Patch against vulnerabilities in Meeting Owl Pro and Whiteboard Owl devices
After a decent amount of pressure, Owl Labs has finally released updates for vulnerabilities in Meeting Owl, and Whiteboard Owl...
After a decent amount of pressure, Owl Labs has finally released updates for vulnerabilities in Meeting Owl, and Whiteboard Owl...
The recent Apple Worldwide Developers Conference (WWDC) revealed another teasing of what has been referred to as “the end of...
Researchers spotted a new variant of the Emotet bot that uses a new module to steal credit card information stored...
Threat actors spread info-stealing malware through the search results for a pirated copy of the CCleaner Pro Windows optimization program....
A router is a gateway from the internet to a home or office — despite being conceived quite the opposite....
0patch researchers released an unofficial security patch for a Windows zero-day vulnerability dubbed DogWalk. 0patch released an unofficial security patch...
Trend Micro Research observed the resurgence of the Cuba ransomware group that launched a new malware variant using different infection...
Malware authors and distributors are following the ebbs and flow of the threat landscape. One campaign we have tracked for...
“A robot may not injure a human being or, through inaction, allow a human being to come to harm” Science...
An international operation led by the US authorities dismantled and seized the infrastructure of the online marketplace SSNDOB. US DoJ announced...
There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros...
The United States Department of Justice has announced a major takedown of a criminal marketplace that traded Personally Identifiable Information...
China-linked threat actors have breached telecommunications companies and network service providers to spy on the traffic and steal data. US...
A mobile app violated Canada’s privacy laws via some pretty significant overreach with its tracking of device owners. The violation...
Black Basta ransomware gang implemented a new feature to encrypt VMware ESXi virtual machines (VMs) running on Linux servers. The...
This blog is part of our live coverage from RSA Conference 2022: US President Joseph R. Biden Jr., The White...
Account hijacking has sadly become a regular, everyday occurrence. But when it comes to hijacking accounts before they are even...
Mandiant researchers associate multiple LockBit ransomware attacks with the notorious Evil Corp Cybercrime Group. Mandiant researchers have investigated multiple LOCKBIT ransomware attacks...
Apple’s App Review process may have received ill wishes from many benevolent developers, but Apple has now revealed how effective...
The QBot malware operation has partnered with Black Basta ransomware group to target organizations worldwide. Researchers from NCC Group spotted...
At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool...
Prometheus—a ransomware build based on Thanos that locked up victims’ computers in the summer of 2021—included a major “vulnerability” that...
LockBit ransomware gang claims to have hacked the cybersecurity firm Mandiant, which is investigating the alleged security breach. Today the...
In this report, we investigate the reasons that the DeadBolt ransomware family is more problematic for its victims than other...