Google alerts abused to deliver fake Adobe Flash updater
Security researchers warn that the threat actors are misusing Google Alerts to promote a fake Adobe Flash Player updater that installs other unwanted programs...
Apple fixes macOS zero-day bug exploited by Shlayer malware
Mac users urged to update OS to fix 'massively bad' bug
Apple fixed a zero-day vulnerability in its macOS which was being exploited in the...
Improving the Vulnerability Reporting Process With 5 Steps
Follow these tips for an effective and positive experience for both the maintainer and external vulnerability reporter.
Vulnerability reports come at open source project maintainers...
New CISA Advisories Warn of ICS Vulnerabilities
The vulnerabilities exist in Cscape control system application programming software and the Mitsubishi Electric GOT.
The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA)...
4 Predictions for the Future of Privacy
Use these predictions to avoid pushback, find opportunity, and create value for your organization.
in recent years, concerns about the erosion of trust and invasion...
8 Security & Privacy Apps to Share With Family and Friends
Mobile apps to recommend to the people in your life who want to improve their online security and privacy.
As technology continues to permeate everyday...
Microsoft Warns of Malware Delivery via Google URLs
A new campaign abuses legitimate website contact forms to send URLs that ultimately deliver the IcedID banking Trojan.
Microsoft has warned organizations of a new...
7 Security Strategies as Employees Return to the Office
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new...
4 Open Source Tools to Add to Your Security Arsenal
Open source solutions can offer an accessible and powerful way to enhance your security-testing capabilities.
Security research often requires a wide variety of tools and...
6 Tips for Limiting Damage From Third-Party Attacks
The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.
The...