| Security Research News |
| Showing 'Security Research News' from 1 to 10|
| |Hackers Breach NASA, Steal Mars Mission Data The infiltration was only spotted and stopped after the hackers roamed the network undetected for almost a year
The post Hackers breach NASA, steal Mars mission data appeared first on WeLiveSecurity
| |5 Principles Driving A Customer-obsessed Identity Strategy At Microsoft The cloud era has fundamentally changed the way businesses must think about security and identity. Learn the five principles driving the customer-obsessed identity strategy at Microsoft.
The post 5 principles driving a customer-obsessed...
| |Inside Out: Get To Know The Advanced Technologies At The Core Of Microsoft Defender ATP Next Generation Protection While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen. Multiple next-generation protection engines...
| |CVE-2019-8635: Double Free Vulnerability In Apple MacOS Lets Attackers Escalate System Privileges And Execute Arbitrary Code We discovered a double free vulnerability (assigned as CVE-2019-8635) in macOS. The vulnerability is caused by a memory corruption flaw in the AMD component. If successfully exploited, an attacker can implement privilege escalation and...
| |Privacy Legislation May Soon Affect Smaller Businesses Why smaller businesses cannot afford to ignore how they gather, store and protect data
The post Privacy legislation may soon affect smaller businesses appeared first on WeLiveSecurity
| |The Evolution Of Microsoft Threat Protection, June Update Learn about new Microsoft Threat Protection capabilities now in public preview.
The post The evolution of Microsoft Threat Protection, June update appeared first on Microsoft Security.
| |Investigating Identity Threats In Hybrid Cloud Environments Announcing a new identity threat investigation experience.
The post Investigating identity threats in hybrid cloud environments appeared first on Microsoft Security.
| |Cryptocurrency Mining Botnet Arrives Through ADB And Spreads Through SSH We observed a new cryptocurrency mining botnet that arrives via open ADB (Android Debug Bridge) ports and can spread via SSH. This attack takes advantage of the way open ADB ports don’t have authentication by default, similar to the Satori...
| |LoudMiner: Cross-platform Mining In Cracked VST Software The story of a Linux miner bundled with pirated copies of VST (Virtual Studio Technology) software for Windows and macOS
The post LoudMiner: Cross-platform mining in cracked VST software appeared first on WeLiveSecurity
| |Collections Firm Behind LabCorp, Quest Breaches Files For Bankruptcy A medical billing firm responsible for a recent eight-month data breach that exposed the personal information on nearly 20 million Americans has filed for bankruptcy, citing "enormous expenses" from notifying affected consumers and the...
| 1 2 3 4 5 6 7 8 9 10 Older » |