Twitter breach: Staff tricked by ‘phone spear phishing’
The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures
The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures
The databases contain personal information that could be used for phishing attacks and identity theft schemes
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The Bureau expects cybercriminals to increasingly abuse new threat vectors for large-scale DDoS attacks
The attackers and their motivations remain unknown; however, the incidents yet again highlight the risks of careless data security
In another incident, ransomware attackers almost forced the cancellation of a match, a report reveals
The tech giant introduces its own version of verified accounts in Gmail, rolls out increased moderation controls in Meet, and enhances phishing protection in Chat
The open letter highlights five security and privacy principles that require heightened attention from videoconferencing services
Telecom Argentina says it has contained the attack and regained access to its systems without paying up
A report calls into question the providers’ security practices and dismisses their claims of being no-log VPN services
The Identity Theft Resource Center doesn't expect the trend to last, however
Tech titans and prominent politicians among victims of a sprawling hack that Twitter says leveraged its internal tools
ESET researchers lure GMERA malware operators to remotely control their Mac honeypots
The company urges organizations to waste no time in installing updates to fix the vulnerability that rates a ‘perfect’ 10 on the severity scale
It appears that the July 2019 breach at MGM Resorts affected far more people than initially thought
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
ESET research uncovers a malicious operation that both spies on victims and leaks their data
The vulnerability exposed Zoom users running Windows 7 or earlier OS versions to remote attacks
A study paints a dim picture of router security, as none of the 127 devices tested was free of severe vulnerabilities