Research suggests that people’s personality types can influence whether they would be more likely to fall for social engineering attacks or be less likely to click on phishing links.
A number of HTTP/2 server implementations are vulnerable to eight newly disclosed denial-of-service flaws.
Microsoft has fixed two new remotely exploitable vulnerabilities in Windows that are similar to the BlueKeep bug and could be exploited by a worm.
New research from Google and the University of Florida shows that attackers use a variety of emotional triggers to trick victims into falling for their schemes.
The Google Project Zero team is encouraging public attack research teams to form a coalition to collaborate and share data.
Improving communication between security teams and the rest of the organization can greatly improve an enterprise's security posture.
Deepfakes aren't just weird political videos. Enterprises should be concerned about how deepfakes could impact their reputation and financial health and include them in incident response plans.
Researchers have discovered two new flaws in the Dragonfly handshake in the WPA3 WiFi security standard.
As organizations grapple with soaring costs of cyberattacks, many are asking insurance companies for help reducing risks. But insurance providers are also hedging their bets because cyber insurance is so risky.
Financial services organizations and many other enterprises have hesitated to go all in the cloud, citing concerns about depending on a third-party to protect the data, and the Capital One breach may encapsulate their fears. But the fact is, the cloud provides security benefits, so long as proper controls are put in place.
The breach of Capital One data on Amazon Web Services is a insider threat story. Defending from malicious insiders is a different ballgame than from outsiders.
VxWorks is the operating system no one has ever heard of, but it is widely used in industrial control systems, robotics and automation, industrial control systems, and Internet of Things. The URGENT/11 group of vulnerabilities in these devices can be exploited remotely.
Zero day vulnerabilities exploited in the wild is never good news, but if the user's machine is running the latest version of the operating system, the chances are good that the attack won't be successful against that machine, according to a Microsoft security engineer.
What a week for BlueKeep watchers. Chinese-language slide deck appears on GitHub with details on how to use the BlueKeep vulnerability, Immunity includes a working exploit in its penetration testing kit, and the WatchBog cryptocurrency-mining botnet now has a scanner looking for vulnerable Windows machines with Remote Desktop enabled.
The Kazakhstan government's efforts to intercept HTTPS connections and eavesdrop on secure traffic is a dangerous policy, experts say.