VideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.
The phone company has sued the startup for copyright infringement.
A detailed look at underground forums shows that cybercriminals aren't sure where to look on the heels of the GandCrab ransomware group shutting its doors - and low-level actors are taking advantage of that by developing their own strains.
Eight vulnerabilities would allow a range of attacker activities, including taking the Nest camera offline, sniffing out network information and device hijacking.
Researchers say that the targeted ransomware cyberattack on 23 Texas local and state entities represents a shift from "attacks of opportunity" to more targeted, malicious attacks.
It's been around forever, but in a modern digital era marked by influence campaigns and deep fakes, information warfare has become much easier to carry out.
The number of exposed records has hit record highs in just the first two quarters.
More than 300,000 users still utilize credentials that have been compromised - with people visiting video streaming and porn sites most at fault, Google found in a new study.
From the biometrics of one million being exposed, to new Microsoft Bluekeep-like threats, Threatpost discusses the top news of the week.
Eight vulnerabilities in the HTTP/2 server implementations were found in vendors Amazon, Apple, Microsoft and Apache.
The savvy technique of avoiding malicious links in the email allowed the phishing attack to reach its targets.
Up to 24 Apache Struts Security Advisories listed the wrong versions that were impacted by vulnerabilities, researchers warn.
700,000 customer records were exposed after being housed on a vendor's server that lacked appropriate security.
Researchers said that clickjacking is a threat that's evolving, with new tactics just starting to emerge.
A publicly accessible database exposed the fingerprints and facial recognition information of millions, thrusting biometrics security into the spotlight once again.
The notebook maker is warning users of three separate vulnerabilities.
A bug in an obscure legacy Windows protocol can lead to serious real-world privilege-escalation attacks.
Overall, Intel stomped out three high-severity vulnerabilities and five medium-severity flaws.
Bug submission program uses the SecureDrop platform to ensure anonymity.
Hundreds of contractors reportedly were hired to transcribe Messenger voice chats in order to test the accuracy of an AI algorithm -- raising questions about what Facebook does with the data.