An exploit taking advantage of a critical flaw in Adobe's Flash Player that enables attackers to take total control of Windows, Apple Mac and Linux computers has been absorbed into popular malware kits...
A few steps leaders can take before, during or after an attack to protect their companies from phishing
'We want to work together with FBI, with local law enforcement in case some people use Zoom for a bad purpose' says CEO Eric Yuan
Improper usage was identified as the most common attack vector last year
Redesigned for stealth and adaptability, data-stealing Valak malware targets Microsoft Exchange Server in enterprises
Valak has been rapidly reconfigured for data exfiltration and has been spotted targeting US and German enterprises