RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven’t yet patched CVE-2019-19781.
The file-sharing service also disclosed details of past notable bugs for the first time.
Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.
From ransomware ramp up, to voice assistant privacy perils, the Threatpost team breaks down the top news stories from this past year.
Artificial intelligence can provide manpower, context and risk assessment.
The tech giant is looking for full working exploits with any vulnerability submission.
It’s important for businesses of all sizes to not only view their suppliers’ attack surface as their own but also extend some of their security protections.
Some Microsoft applications are vulnerable to an authentication issue that could enable Azure account takeover.
The majority give outside partners, contractors and suppliers administrative access — without strong security policies in place.