Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’

As the company continues to battle security woes, it has acquired Keybase to boost security and privacy. A full cryptographic draft architecture will be available on May 22. Continue reading Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’

Upgraded Cerberus Spyware Spreads Rapidly via MDM

No longer a simple Android banker, Cerberus is now a full-fledged RAT that can take complete control of devices and automatically spread via mobile device management servers. Continue reading Upgraded Cerberus Spyware Spreads Rapidly via MDM

Salt Bugs Allow Full RCE as Root on Cloud Servers

Researchers say the bugs are easy to exploit and will likely be weaponized within a day. Continue reading Salt Bugs Allow Full RCE as Root on Cloud Servers

Millions of Brute-Force Attacks Hit Remote Desktop Accounts

Automated attacks on Remote Desktop Protocol accounts are aimed at taking over corporate desktops and infiltrating networks. Continue reading Millions of Brute-Force Attacks Hit Remote Desktop Accounts

ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel

Overall bot activity on the web has soared, with a 26 percent growth rate — attacks on applications, APIs and mobile sites are all on the rise. Continue reading ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel

Enterprise Security Woes Explode with Home Networks in the Mix

Thanks to WFH, IoT refrigerators, Samsung TVs and more can now be back-channel proxies into the corporate network. Continue reading Enterprise Security Woes Explode with Home Networks in the Mix