The number of connected devices deployed in today’s enterprise IT infrastructure represents a serious cyber risk to networks and their associated data and systems. Srinivas Loke of Ordr discusses how asset inventory and attack surface visibility could help manage vulnerabilities…
Source: www.spiceworks.com – Read more

Social Engineering Campaign Abuses Zoom to Install Malware
Security researchers at Trail of Bits have identified a threat actor, ELUSIVE COMET, launching a social engineering campaign abusing Zoom’s remote control feature to take