You are here |
www.proofpoint.com | ||
| | | |
www.lookout.com
|
|
| | | | Based on an analysis of Lookout's security dataset of more than 300 million mobile apps, 220 million mobile devices, and billions of web items, Lookout has authored the Mobile Threat Landscape Report. | |
| | | |
www.trendmicro.com
|
|
| | | | The newly discovered Underminer exploit kit delivers a bootkit that infects the system's boot sectors as well as a cryptocurrency-mining malware named Hidden Mellifera. | |
| | | |
securelist.com
|
|
| | | | On October 10, 2017, we identified a new Adobe Flash zero day exploit used in the wild against our customers. The exploit was delivered through a Microsoft Office document and the final payload was the latest version of FinSpy malware. | |
| | | |
www.sonatype.com
|
|
| | The Cyber Resilience Act is the European Union's proposed regulation to combat threats affecting any digital entity. What does that mean for open source? |