Archives for December, 2019
Use the seven points listed above to create an effective and efficient operational workflow and, importantly, happier analysts who aren't buried at the bottom of a pile of mostly irrelevant data.
Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.
The Internet of Things vendor confirmed that customer data was left unsecured on an Elasticsearch database.
Given that the average time to weaponizing a new bug is seven days, you effectively have 72 hours to harden your systems before you will see new exploits.
Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.
Researchers warn that five vulnerabilities that stem from SQLite could enable remote code execution.
2019 was a tumultuous year for Facebook as it continued to grapple with privacy fallout after Cambridge Analytica, as well as dealing with a slew of security challenges.
Threatpost examines the challenges - and opportunities - that women are facing in the cybersecurity landscape.
The flaw resides in the Citrix Application Delivery Controller and Gateway.
Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker's next move.