Source
DARKReading
Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail.
It's time for on-the-record answers to questions about data destruction in cloud environments. Without access, how do you verify data has been destroyed? Do processes meet DoD standards, or do we need to adjust standards to meet reality?
Attackers also could breach internal production data to compromise a corporate network using vulnerabilities found in the BrickLink online platform.
The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing.
The Royal Ransomware Group has emerged as a threat to companies in 2022 and they have carried out dozens of successful attacks on global companies. Cybereason suggests that companies raise their awareness of this potential pending threat.
Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.
Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.
Without many details, Apple patches a vulnerability that has been exploited in the wild to execute code.