Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.
On the first day of Pwn2Own 2019 hackers poked holes in Apple Safari, VMware Workstation and Oracle VirtualBox.
In both breaches of MyPillow and Amerisleep, the customers whose payment information was potentially stolen were not informed.
Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel.
Threatpost talks to Phil Neray with CyberX about Tuesday’s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.
When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.
Gnosticplayers has released about 26 million records from what he said are breaches of six new companies.
With wide deployment expected in the next decade, the driverless automobile landscape looks fraught – from road safety to data protection.
An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.
Attackers are increasingly using insecure legacy protocols, like IMAP, to bypass multi-factor authentication in password spraying campaigns.