Fraudsters Can Access Sensitive Information from Abandoned Domains

Scammers can collect highly sensitive information about a company's activity, employees, and clients, even if after…

New Side-Channel Attack Uses Microphone to Read Screen Content

Using regular microphones, academic researchers managed to pick up acoustic signals from computer displays and determine…

Cheddar Scratch Kitchen Exposes Card Data of Over 500,000

Restaurants in 23 states are on the list of Cheddar Scratch Kitchen locations affected by a…

Cybercriminals Undeterred by ToS For Remcos RAT

Researchers from Cisco Talos are calling out the developer of a remote administration tool (RAT) for…

Microsoft Rolls Out New Intel Microcode for Windows 10, Server 2016

Microsoft has released multiple microcode updates that mitigate additional variants of the speculative code execution vulnerabilities…

Turla Outlook Backdoor Uses Clever Tactics for Stealth and Persistence

The Outlook backdoor Turla APT group uses for espionage operations is an unusual beast built for…

Legacy System Exposes Contact Info of BlackHat 2018 Attendees

Full contact information of everyone attending the BlackHat security conference this year has been exposed in…

Supply Chain Attack Hits Organizations In South Korea

Security researchers have uncovered a new supply chain attack that targets organizations in South Korea. The…