Scammers can collect highly sensitive information about a company's activity, employees, and clients, even if after…
Author: Ionut Ilascu
New Side-Channel Attack Uses Microphone to Read Screen Content
Using regular microphones, academic researchers managed to pick up acoustic signals from computer displays and determine…
Cheddar Scratch Kitchen Exposes Card Data of Over 500,000
Restaurants in 23 states are on the list of Cheddar Scratch Kitchen locations affected by a…
Cybercriminals Undeterred by ToS For Remcos RAT
Researchers from Cisco Talos are calling out the developer of a remote administration tool (RAT) for…
Microsoft Rolls Out New Intel Microcode for Windows 10, Server 2016
Microsoft has released multiple microcode updates that mitigate additional variants of the speculative code execution vulnerabilities…
Turla Outlook Backdoor Uses Clever Tactics for Stealth and Persistence
The Outlook backdoor Turla APT group uses for espionage operations is an unusual beast built for…
Legacy System Exposes Contact Info of BlackHat 2018 Attendees
Full contact information of everyone attending the BlackHat security conference this year has been exposed in…
Supply Chain Attack Hits Organizations In South Korea
Security researchers have uncovered a new supply chain attack that targets organizations in South Korea. The…