How attackers carry out mass exploitation campaigns
Examples of how attackers carry out mass exploitation campaigns and how to defend against them.
Continue reading How attackers carry out mass exploitation campaigns
Examples of how attackers carry out mass exploitation campaigns and how to defend against them.
Continue reading How attackers carry out mass exploitation campaigns
A serious vulnerability in Zoom’s desktop conferencing application could allow a remote attacker to hijack screen controls and kick attendees out of meetings.
Continue reading Hackers can spoof messages, hijack screen controls and kick others out of meetings.
Mike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.
Continue reading Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks