Attackers Exploit 'EvilVideo' Telegram Zero-Day to Hide Malware An exploit sold on an underground forum requires user action to download an unspecified malicious payload.
Fighting Third-Party Risk With Threat Intelligence With every new third-party provider and partner, an organization's attack surface grows. How, then, do enterprises use threat intelligence to enhance their third-party risk management efforts?
LATEST FROM DR TECHNOLOGY
Small Businesses Need Default Security in Products Now Small businesses are increasingly being targeted by cyberattackers. Why, then, are security features priced at a premium?
China's 'Evasive Panda' APT Spies on Taiwan Targets Across Platforms The cohort's variety of individual tools covers just about any operating system it could possibly wish to attack.