In the latest in a series of election security reports from government agencies, the U.S. Department of Homeland Security says Russia poses the most serious nation-state disruption threat to the U.S. presidential election, with China and Iran also posing threats.
Security researchers with the Chinese company Qihoo say they've spotted a new IoT botnet that brute forces telnet ports on routers and other devices and is coded with a command to erase infected devices.
Cybercriminals have weaponized AI tools to easily bypass traditional security controls and create effective new attacks such as credential stuffing.
Download this eBook and learn about:
The evolution of cybersecurity;
The growing, shifting attack surface;
How emerging technologies such as AI, machine learning...
John McAfee, the founder of the cybersecurity firm that bears his name who also is a serial entrepreneur and a former presidential candidate, has been charged with federal income tax evasion. Plus, the SEC is accusing him of promoting initial virtual coin offerings without disclosing he was paid to do so.
A Chinese-speaking hacking group used a rare Unified Extensible Firmware Interface bootkit dubbed "MosaicRegressor" to target nongovernment organizations and diplomatic missions with an espionage campaign for two years, the security firm Kaspersky reports.
Security researchers are warning of a fresh wave of phishing emails with election-related lures that are designed to get users to click, opening the door to spreading the Emotet botnet or harvesting users' credentials.
Security operations (SecOps) leaders say they struggle to detect hidden and unknown threats with legacy tools, mitigating the potential threats of dark data, and overcoming resource-intensive issues to stay ahead of cyberthreats. They have to navigate these challenges while dealing with a talent shortage.
Operational and cyber risk teams at financial institutions often face cyber resiliency challenges due to the complex, highly interdependent nature of their application environments. With zero-downtime applications and critical dependencies extending across new and old infrastructure, it's more difficult than ever for...
Microsoft has issued additional instructions on how to better implement a patch to fix an elevation of privilege vulnerability called Zerologon in Windows Server that affects the Netlogon Remote Protocol. The update comes as Cisco Talos researchers report a spike in attempts to exploit the flaw.
For businesses utilizing diverse software tools to support their workforce, IT consolidation is critical. Consolidation of IT tools creates the opportunity to provide better services while decreasing costs and increasing insight and security.
Download this product snapshot to learn more!
LogMeIn simplifies how people connect with each other and the world around them, unlocking the potential of the modern workforce. Our support solutions, Rescue and Central, give you new ways to reach today's connected end user and manage your IT infrastructure.