The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.
The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems.
As warfare extends to cyberspace, U.S.-based organizations can use email and web isolation to protect users from common tactics used by Iranian-backed threat actors.
The malware uses thousands of partner websites to spread malvertising code.
The critical flaw exists in Cisco’s administrative management tool, used with network security solutions like firewalls.
New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties.
A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn’t going away anytime soon.
More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.
CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover.
iPhone users can now use Bluetooth to secure their Google accounts.