Loading...

Follow Threatpost | The first stop for security news on Feedspot

Continue with Google
Continue with Facebook
or

Valid

Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The FTC has levied its biggest fine ever against the social network, but it's unlikely to have much effect.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A dropper called “Topinambour" is the first-stage implant, which in turn fetches a spy trojan built in several coding languages.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types.
Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview