Facebook users can fuel a social spam botnet by providing verified apps' access tokens in exchange for "likes" and comments.
What has not been updated in the new Top 10 list is almost more significant than what has.
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.
OilRig aka Helix Kitten nation-state group leveraged Microsoft zero-day bug in targeted attacks.
A call center in India was used to scare US residents with threats of imprisonment and deportation in a ruse that impersonated US officials.
Microsoft received 0-499 surveillance requests from January to June 2016, correcting an earlier report stating orders spiked to 1,000-1,499.
The US Department of Health and Human Services slapped the mobile cardiac monitoring service with fee after breach of customer health data.
There is much to be learned from the striking parallels between counter-terrorism threat analysis before 9-11 and how we handle cyber threat intelligence today.