Security researchers with the Chinese company Qihoo say they've spotted a new IoT botnet that brute forces telnet ports on routers and other devices and is coded with a command to erase infected devices.
Cybercriminals have weaponized AI tools to easily bypass traditional security controls and create effective new attacks such as credential stuffing.
Download this eBook and learn about:
The evolution of cybersecurity;
The growing, shifting attack surface;
How emerging technologies such as AI, machine learning...
John McAfee, the founder of the cybersecurity firm that bears his name who also is a serial entrepreneur and a former presidential candidate, has been charged with federal income tax evasion. Plus, the SEC is accusing him of promoting initial virtual coin offerings without disclosing he was paid to do so.
A Chinese-speaking hacking group used a rare Unified Extensible Firmware Interface bootkit dubbed "MosaicRegressor" to target nongovernment organizations and diplomatic missions with an espionage campaign for two years, the security firm Kaspersky reports.
Security researchers are warning of a fresh wave of phishing emails with election-related lures that are designed to get users to click, opening the door to spreading the Emotet botnet or harvesting users' credentials.
A new malware variant dubbed Black-T developed by the hacker group TeamTnT targets exposed Docker daemon APIs to perform scanning and cryptojacking operations, according to researchers at Palo Alto Networks' Unit 42.
Operational and cyber risk teams at financial institutions often face cyber resiliency challenges due to the complex, highly interdependent nature of their application environments. With zero-downtime applications and critical dependencies extending across new and old infrastructure, it's more difficult than ever for...
In October, Nacha will launch the Payment Information Exchange Platform, or Phixius, a secure network of linked credentialed service providers designed to improve data exchange for payments to help fight fraud. George Throckmorton of Nacha explains how it works.
Microsoft has issued additional instructions on how to better implement a patch to fix an elevation of privilege vulnerability called Zerologon in Windows Server that affects the Netlogon Remote Protocol. The update comes as Cisco Talos researchers report a spike in attempts to exploit the flaw.
For businesses utilizing diverse software tools to support their workforce, IT consolidation is critical. Consolidation of IT tools creates the opportunity to provide better services while decreasing costs and increasing insight and security.
Download this product snapshot to learn more!
LogMeIn simplifies how people connect with each other and the world around them, unlocking the potential of the modern workforce. Our support solutions, Rescue and Central, give you new ways to reach today's connected end user and manage your IT infrastructure.