Unusual Linux Ransomware Targets NAS Servers
QNAPCrypt continues to spread via brute-force attacks. Go to Source
QNAPCrypt continues to spread via brute-force attacks. Go to Source
A lack of a Bluetooth Low Energy (BLE) pairing mechanism leaves the smart IoT devices open to malicious manipulation. Go to Source
Google is under fire after a report found that Google Home and Google Assistant records user audio, even when no wake-up word is used. Go to Source
The tech giant addressed a widely publicized Zoom bug with an automatic update mechanism usually reserved for removing malware. Go to Source
Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations. Go to Source
Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. Go to Source
Cynet’s 360 platform is ready out-of-the-box, for fast, easy deployment across all endpoints. Go to Source
GE Healthcare said an attacker could modify gas composition parameters within the devices’ respirator function. Go to Source
After media scrutiny, the collaboration service has decided to address the zero-day after initially dismissing its severity. Go to Source
The espionage tool is capable of eavesdropping on calls and messages sent via Signal, Telegram, WhatsApp and more. Go to Source