Pulse Secure Critical Zero-Day Security Bug Under Active Exploit

CVE-2021-22893 allows remote code-execution (RCE) and is being used in the wild by nation-state cyberattackers to compromise VPN appliances in defense, finance and government orgs. | Continue reading


@threatpost.com | 3 years ago

Mozilla Fixes Firefox Flaw That Allowed Spoofing of HTTPS Browser Padlock

The Mozilla Foundation releases Firefox 88, fixing 13 bugs ranging from high to low severity. | Continue reading


@threatpost.com | 3 years ago

Various malware lurking in discord app to target gamers

Research from Zscaler ThreatLabZ shows attackers using spam emails and legitimate-looking links to gaming software to serve up Epsilon ransomware, the XMRrig cryptominer and various data and token… | Continue reading


@threatpost.com | 3 years ago

iOS Kids Game Morphs into Underground Crypto Casino

A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with a casino-like functionality. | Continue reading


@threatpost.com | 3 years ago

Security Bug Allows Attackers to Brick Kubernetes Clusters

The vulnerability is triggered when a cloud container pulls a malicious image from a registry. | Continue reading


@threatpost.com | 3 years ago

Ransomware Attack Creates Dutch Cheese Shortages

Not a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw. | Continue reading


@threatpost.com | 3 years ago

FBI: APTs Actively Exploiting Fortinet VPN Security Holes

Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon. | Continue reading


@threatpost.com | 3 years ago

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Google’s Pixel and Apple’s iPhone both in privacy hot seat for siphoning mobile device data without consent. | Continue reading


@threatpost.com | 3 years ago

ProtonVPN CEO Blasts Apple for ‘Aiding Tyrants’ in Myanmar

CEO says Apple rejected a security update needed to protect human-rights abuse evidence. | Continue reading


@threatpost.com | 3 years ago

Office 365 Cyberattack Lands Disgruntled IT Contractor in Jail

A former IT contractor is facing jailtime after a retaliatory hack into a company’s network and wiping the majority of its employees’ Microsoft Office 365 accounts. | Continue reading


@threatpost.com | 3 years ago

CISA Warns of Security Flaws in GE Power Management Devices

The flaws could allow an attacker to access sensitive information, reboot the UR, gain privileged access, or cause a denial-of-service condition. | Continue reading


@threatpost.com | 3 years ago

Warrant Canaries

The EFF and other companies have lunched the Canary Watch site to monitor warrant canaries related to NSA surveillance. | Continue reading


@threatpost.com | 3 years ago

Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices

A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices, as well as newly-discovered flaws in unknown IoT devices. | Continue reading


@threatpost.com | 3 years ago

Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix

Public proof-of-concept (PoC) exploits for ProxyLogon could be fanning a feeding frenzy of attacks even as patching makes progress. | Continue reading


@threatpost.com | 3 years ago

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

The use-after-free vulnerability is the third Google Chrome zero-day flaw to be disclosed in three months. | Continue reading


@threatpost.com | 3 years ago

Linux systems under attack by new RedXOR malware

Researchers say the new RedXOR backdoor is targeting Linux systems with various data exfiltration and network traffic tunneling capabilities. | Continue reading


@threatpost.com | 4 years ago

Sky ECC claims that cops cracked a fake version of the app

Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled reseller. | Continue reading


@threatpost.com | 4 years ago

Google Patches Actively Exploited Flaw in Chrome Browser

A flaw (CVE-2021-21166) in the Audio component of Google Chrome is fixed in a new update being pushed out to Windows, Mac and Linux users. | Continue reading


@threatpost.com | 4 years ago

Microsoft Exchange Zero-Day Attackers Spy on U.S. Targets

Full dumps of email boxes, lateral movement and backdoors characterize sophisticated attacks by a Chinese APT – while more incidents spread like wildfire. | Continue reading


@threatpost.com | 4 years ago

Malicious Code Bombs Target Amazon, Lyft, Slack, Zillow

Attackers have weaponized code dependency confusion to target internal apps at tech giants. | Continue reading


@threatpost.com | 4 years ago

Firewall Vendor Patches Critical Auth Bypass Flaw

Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users. | Continue reading


@threatpost.com | 4 years ago

Ryuk Ransomware: Now with Worming Self-Propagation

The Ryuk scourge has a new trick in its arsenal: Self-replication via SMB shares and port scanning. | Continue reading


@threatpost.com | 4 years ago

Malicious Mozilla Firefox Extension Allows Gmail Takeover

The malicious extension, FriarFox, snoops in on both Firefox and Gmail-related data. | Continue reading


@threatpost.com | 4 years ago

Lazarus Targets Defense Companies with ThreatNeedle Malware

A spear-phishing campaigned linked to a North Korean APT uses “NukeSped” malware in cyberespionage attacks against defense companies. | Continue reading


@threatpost.com | 4 years ago

Kia Motors Hit with $20M Ransomware Attack – Report

DoppelPaymer ransomware gang claims credit for Kia’s outage, demands $20 million in double-extortion attack. | Continue reading


@threatpost.com | 4 years ago

Actively Exploited Windows Kernel EoP Bug Allows Takeover

Microsoft addressed 56 security vulnerabilities for February Patch Tuesday — including 11 critical and six publicly known. And, it continued to address the Zerologon bug. | Continue reading


@threatpost.com | 4 years ago

Android Devices Hunted by LodaRAT Windows Malware

The LodaRAT – known for targeting Windows devices – has been discovered also targeting Android devices in a new espionage campaign. | Continue reading


@threatpost.com | 4 years ago

Fake Forcepoint Google Chrome Extension Hacks Windows Users

In a unique attack, cybercriminals locally install an extension to manipulate data in internal web applications that the victims have access to. | Continue reading


@threatpost.com | 4 years ago

Ransomware Demands Spike 320%, Payments Rise

Remote work continues to fueling a spike in phishing and cyberattacks, particularly in the U.S. | Continue reading


@threatpost.com | 4 years ago

Google Chrome Zero-Day Afflicts Windows, Mac Users

Google warns of a zero-day vulnerability in the V8 open-source engine that's being actively exploited by attackers. | Continue reading


@threatpost.com | 4 years ago

Hey Alexa, Who Am I Messaging?

Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info. | Continue reading


@threatpost.com | 4 years ago

New Malware Hijacks Kubernetes Clusters to Mine Monero

Researchers warn that the Hildegard malware is part of 'one of the most complicated attacks targeting Kubernetes.' | Continue reading


@threatpost.com | 4 years ago

Five Critical Android Bugs Patched, Part of Feb. Security Bulletin

February’s security update for the mobile OS includes a Qualcomm flaw rated critical, with a CVSS score of 9.8. | Continue reading


@threatpost.com | 4 years ago

Clearview Facial-Recognition Technology Ruled Illegal in Canada

The company’s controversial practice of collecting and selling billions of faceprints was dealt a heavy blow by the Privacy Commissioner that could set a precedent in other legal challenges. | Continue reading


@threatpost.com | 4 years ago

Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges

Feds charged California-based private detective for stealing $11M from investors, with help from actor Steven Seagal. | Continue reading


@threatpost.com | 4 years ago

Remote Attackers Can Now Reach Protected Network Devices via Nat Slipstreaming

A new version of NAT slipstreaming allows cybercriminals an easy path to devices that aren't connected to the internet. | Continue reading


@threatpost.com | 4 years ago

LogoKit Simplifies Office 365, SharePoint ‘Login’ Phishing Pages

A phishing kit has been found running on at least 700 domains – and mimicking services via false SharePoint, OneDrive and Office 365 login portals. | Continue reading


@threatpost.com | 4 years ago

Linux Devices Under Attack by New FreakOut Malware

The FreakOut malware is adding infected Linux devices to a botnet, in order to launch DDoS and cryptomining attacks. | Continue reading


@threatpost.com | 4 years ago

214M Social Profiles Leaked by Chinese Data-Scrapers

A cloud misconfig by SocialArks exposed 318 million records gleaned from Facebook, Instagram and LinkedIn. | Continue reading


@threatpost.com | 4 years ago

Lazarus Group Hits Covid-19 Vaccine-Maker in Espionage Attack

The nation-state actor is looking to speed up vaccine development efforts in North Korea. | Continue reading


@threatpost.com | 4 years ago

Smart Doorbell Disaster: Many Brands Vulnerable to Attack

Investigation reveals device sector is problem plagued when it comes to security bugs. | Continue reading


@threatpost.com | 4 years ago

Air-Gap Attack Turns Memory Modules into Wi-Fi Radios

Attack turns SDRAM buses into a Wi-Fi radio to leak data from air-gapped computers. | Continue reading


@threatpost.com | 4 years ago

The SolarWinds Perfect Storm: Default Password, Access Sales and More

Meanwhile, FireEye has found a kill switch, and Microsoft and other vendors are quickly moving to block the Sunburst backdoor used in the attack. | Continue reading


@threatpost.com | 4 years ago

Firefox Patches Critical Mystery Bug, Also Impacting Google Chrome

Mozilla Foundation releases Firefox 84 browser, fixing several flaws and delivering performance gains and Apple processor support. | Continue reading


@threatpost.com | 4 years ago

Ex-Cisco Employee Convicted for Deleting 16K Webex Accounts

The insider threat will go to jail for two years after compromising Cisco's cloud infrastructure. | Continue reading


@threatpost.com | 4 years ago

DeathStalker Apt Spices Things Up with PowerPepper Malware

A raft of obfuscation techniques turn the heat up for the hacking-for-hire operation. | Continue reading


@threatpost.com | 4 years ago

Cybersecurity Predictions for 2021

While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense. | Continue reading


@threatpost.com | 4 years ago

Good Heavens 10M Impacted in Pray.com Data Exposure

The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists. | Continue reading


@threatpost.com | 4 years ago