Using vulnerabilities, local attackers can bypass security features.
GRIMM specialists have discovered vulnerabilities in the iSCSI subsystem of the Linux kernel that allow local attackers with basic user privileges to increase their privileges to superuser. Vulnerabilities can only be...
Over the past three months, at least 2.5 thousand fake emails were sent to senior employees of banks and IT companies.
Cybercriminals are sending thousands of phishing emails to Microsoft Office 365 users as part of an ongoing malicious campaign to steal credentials. The attackers give the...
Security researchers have reported an increase in cyber attacks using Google services as a weapon to circumvent security measures and steal credentials, credit card data and other personal information.
A team of experts from Armorblox analyzed five phishing campaigns, which they call the "tip...