Business email compromise still most popular and most effective attack vector. The bulk of email fraud gangs still operate out of Nigeria, according to new research.
Security researchers have unearthed six flaws in Dell EMC RecoverPoint devices. One flaw could enable attackers to execute unauthenticated remote code with root privileges.
Network equipment vendor Draytek has said several of its wireless routers are vulnerable to exploits allowing hackers to remotely change the device's DNS and DHCP settings and potentially steal personal data to hijack web traffic.
Increasing value of cryptocurrency sees hackers look out for mining hardware. Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs.
Ransomware gives you ten minutes to comply. Ransomware is under development that gives victims 10 minutes to enter a code and will delete the contents of a hard drive in the event of failure.