| Security Research News |
| Showing 'Security Research News' from 81 to 90|
| |Medical Debt Collection Firm R1 RCM Hit In Ransomware Attack R1 RCM Inc. [NASDAQ:RCM], one of the nations largest medical debt collection companies, has been hit in a ransomware attack.
| |XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack On Safari, Other Browsers, Leverages Zero-day Exploits We have discovered an unusual infection related to Xcode developer projects. Upon further investigation, we discovered that a developer’s Xcode project at large contained the source malware, which leads to a rabbit hole of malicious payloads....
| |Mekotio: These Aren’t The Security Updates You’re Looking For… Another in our occasional series demystifying Latin American banking trojans
The post Mekotio: These aren’t the security updates you’re looking for… appeared first on WeLiveSecurity
| |What Is The Cost Of A Data Breach? The price tag is higher if the incident exposed customer data or if it was the result of a malicious attack, an annual IBM study finds
The post What is the cost of a data breach? appeared first on WeLiveSecurity
| |Why & Where You Should You Plant Your Flag Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where...
| |August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited In The Wild The August batch of Patch Tuesday updates includes 120 updates for the Microsoft suite, with 17 fixes rated as Critical, and the remaining 103 ranked as Important.
The post August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities...
| |Twitter Working To Fix Issue With 2FA Feature
| |Microsoft Patch Tuesday, August 2020 Edition Microsoft today released updates to plug at least 120 security holes in its Windows operating systems and supported software, including two newly discovered vulnerabilities that are actively being exploited. Yes, good people of the Windows...
| |COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon
Tracker Module During a recent investigation at a telecommunications company led byMandiantManaged Defense, our team was tasked with rapidly identifyingsystems that had been accessed by a threat actor using legitimate, butcompromised domain credentials....
| |Black Hat 2020: Fixing Voting – Boiling The Ocean? With the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
The post Black Hat 2020: Fixing voting– boiling the ocean? appeared first on WeLiveSecurity
| « Newer 4 5 6 7 8 9 10 11 12 13 Older » |