Joomla flaws exploited to place backdoors, then patched by same attackers: Researchers spotted attackers expl... https://t.co/1SzATIhvHq
Phishing emails promising invites to cybersecurity conference actually dispersing malware: Threat actors have... https://t.co/kkktJTnyQ6
Fraud report names most sophisticated cyber-attacks globally in 2016: Fraud is in a constant state of evoluti... https://t.co/lx1OjPyxqT
LTE vulnerabilities could allow attackers to reroute calls to malicious base station: A researcher from Chine... https://t.co/0bk2jABSLF
New approaches needed to combat next-gen threats: Conventional approaches have not been successful in mitigat... https://t.co/7AfcUlOgAq
Researchers spot cybercrooks actively upgrading Mirai botnet: An researcher spotted threat actors actively up... https://t.co/vQ6SZXRgcd
Security pros must think like militias: The rapidly changing threat landscape requires new ways of thinking a... https://t.co/uUJzaICN2J
Ukranian Cyber Hunta claim Putin aide hack, release incriminating emails: Emails from the office of longtime ... https://t.co/1f09zPOQkx
Panel: Obsession with regulatory compliance doesn't guarantee good cybersecurity: Companies should spend less... https://t.co/e8ODwTviKV
FCC requires ISPs to get customer opt-in before sharing data: The commission called the privacy rules a "fram... https://t.co/WcXADgawtP