Dating Site Bumble Leaves Swipes Unsecured for 100M Users

Bumble fumble: An API bug exposed personal information of users like political leanings, astrological signs, education, and even height and weight, and their distance away in miles. | Continue reading


@threatpost.com | 4 years ago

Zoom Takes on Zoom-Bombers Following FTC Settlement

The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls. | Continue reading


@threatpost.com | 4 years ago

Some Apple Apps on macOS Big Sur Bypass Content Filters, VPNs

Attackers can exploit the feature and send people’s data directly to remote servers, posing a privacy and security risk, researchers said. | Continue reading


@threatpost.com | 4 years ago

Ghimob Android Banking Trojan Targets 153 Mobile Apps

A banking trojan is targeting mobile app users in Brazil – and researchers warn that its operator has big plans to expand abroad. | Continue reading


@threatpost.com | 4 years ago

Gitpaste-12 Worm Targets Linux Servers, IoT Devices

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors. | Continue reading


@threatpost.com | 4 years ago

Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape

Google Project Zero disclosed the bug before a patch becomes available from Microsoft. | Continue reading


@threatpost.com | 4 years ago

Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts

Hundreds of medical patients taking cancer drugs, Premarin, Lyrica and more are now vulnerable to phishing, malware and identity fraud. | Continue reading


@threatpost.com | 4 years ago

Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts

Companies that use Broadvoice's cloud-based VoIP platform may find their patients, customers, suppliers and partners to be impacted by a massive data exposure. | Continue reading


@threatpost.com | 4 years ago

Heh P2P Botnet Sports Dangerous Wiper Function

The P2P malware is infecting any and all types of endpoints via brute-forcing, with 10 versions targeting desktops, laptops, mobile and IoT devices. | Continue reading


@threatpost.com | 4 years ago

Wormable Apple iCloud Bug Allows Automatic Photo Theft

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack. | Continue reading


@threatpost.com | 4 years ago

Las Vegas Students' Personal Data Leaked, Post-Ransomware Attack

A researcher said he discovered an open data cache with names, grades, birthdates and more, after the Clark County School District refused to pay the ransom. | Continue reading


@threatpost.com | 4 years ago

Feds Hit with Successful Cyberattack, Data Stolen

The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit. | Continue reading


@threatpost.com | 4 years ago

Cisco Patch-Palooza Tackles 29 High-Severity Bugs

Patches and workaround fixes address flaws on networking hardware running Cisco IOS XE software. | Continue reading


@threatpost.com | 4 years ago

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

Privacy fears are blasting off after Amazon's Ring division unveiled the new Always Home Cam, a smart home security camera drone. | Continue reading


@threatpost.com | 4 years ago

Firefox for Android Bug Allows ‘Epic Rick-Rolling’

Anyone on the same Wi-Fi network can force websites to launch, with no user interaction. | Continue reading


@threatpost.com | 4 years ago

Unsecured Microsoft Bing Server Leaks Search Queries, Location Data

Data exposed included search terms, location coordinates, and device information – but no personal data. | Continue reading


@threatpost.com | 4 years ago

TeamTNT Gains Full Remote Takeover of Cloud Instances

Using a legitimate tool called Weave Scope, the cybercrime group is establishing fileless backdoors on targeted Docker and Kubernetes clusters. | Continue reading


@threatpost.com | 4 years ago

Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles

New opt-in COVID-19 Exposure Notifications Express systems baked into Apple’s iOS and available on Android need privacy guardrails, say privacy advocates. | Continue reading


@threatpost.com | 4 years ago

Ransomware and Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans

Cyberattacks have caused several school systems to delay students' first day back – and experts warn that new COVID-related delays could be the new "snow days." | Continue reading


@threatpost.com | 4 years ago

AWS Cryptojacking Worm Spreads Through the Cloud

The malware harvests AWS credentials and installs Monero cryptominers. | Continue reading


@threatpost.com | 4 years ago

China-Based Apt Debuts Sepulcher Malware in Spear-Phishing Attacks

The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents. | Continue reading


@threatpost.com | 4 years ago

U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021

U.S. agencies must implement vulnerability disclosure policies by March 2021, according to a new CISA mandate. | Continue reading


@threatpost.com | 4 years ago

Triple-Threat Cryptocurrency Rat Mines, Steals and Harvests

KryptoCibule spreads via pirated software and game torrents. | Continue reading


@threatpost.com | 4 years ago

Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack

A Tesla employee was reportedly approached by a Russian national and asked to install malware on the company's systems. | Continue reading


@threatpost.com | 4 years ago

Facebook Hits Back at Apple’s iOS 14 Privacy Update

While privacy experts praised Apple’s upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half. | Continue reading


@threatpost.com | 4 years ago

DOJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers

Complaint details collaboration with China to funnel $250m in stolen funds as part of state-sponsored attacks. | Continue reading


@threatpost.com | 4 years ago

Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts

Former Cisco employee Sudhish Kasaba Ramesh admitted to accessing Cisco’s cloud infrastructure and deleting 16,000 Webex Teams employee accounts. | Continue reading


@threatpost.com | 4 years ago

Medical Data Leaked on GitHub Due to Developer Errors

Up to 200,000 patient records from Office 365 and Google G Suite exposed by hardcoded credentials and other improper access controls. | Continue reading


@threatpost.com | 4 years ago

Airline Dmarc Policies Lag, Opening Flyers to Email Fraud

Up to 61 percent out of the IATA (International Air Transport Association) airline members also do not have a published DMARC record. | Continue reading


@threatpost.com | 4 years ago

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory. | Continue reading


@threatpost.com | 4 years ago

Amazon Alexa ‘One-Click’ Attack Can Divulge Personal Data

Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices. | Continue reading


@threatpost.com | 4 years ago

TikTok Surreptitiously Collected User Data Using Google-Prohibited Tactic

App concealed the practice of gathering device unique identifiers using an added layer of encryption. | Continue reading


@threatpost.com | 4 years ago

Black Hat 2020: Mercedes-Benz E-Series Rife with 19 Bugs

Researchers went into detail about the discovery and disclosure of 19 security flaws they found in Mercedes-Benz vehicles, which have all been fixed. | Continue reading


@threatpost.com | 4 years ago

NetWalker Ransomware Rakes in $29M Since March

The ransomware has surged since moving to a RaaS model. | Continue reading


@threatpost.com | 4 years ago

Newsletter WordPress Plugin Opens Door to Site Takeover

An XSS bug and a PHP object-injection vulnerability are present in a plugin used by hundreds of thousands of websites. | Continue reading


@threatpost.com | 4 years ago

Twitter Could Face $250M FTC Fine over Improper Data Use

The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising. | Continue reading


@threatpost.com | 4 years ago

Garmin Pays Up to Evil Corp After Ransomware Attack – Reports

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said. | Continue reading


@threatpost.com | 4 years ago

Twitter: Hackers Accessed Private Messages for Elite Accounts

A Dutch elected official is among those whose DMs were hijacked, the company said. | Continue reading


@threatpost.com | 4 years ago

Twitter Hack Update: What We Know (and What We Don’t)

With limited confirmed information, a raft of theories and circumstantial evidence has come to light as to who was behind the attack and how they carried it out. | Continue reading


@threatpost.com | 4 years ago

Critical SAP Bug Allows Full Enterprise System Takeover

Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more. | Continue reading


@threatpost.com | 4 years ago

Zoom Zero-Day Allows RCE, Patch on the Way

Researchers said that the issue is exploitable on Windows 7 and earlier. | Continue reading


@threatpost.com | 4 years ago

Cerberus Banking Trojan Unleashed on Google Play

The Cerberus malware can steal banking credentials, bypass security measures and access text messages. | Continue reading


@threatpost.com | 4 years ago

15B Credentials Currently Up for Grabs on Hacker Forums

Unprecedented amounts of data for accessing bank accounts and streaming services are being flogged on the dark web. | Continue reading


@threatpost.com | 4 years ago

Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

Admins should patch their Citrix ADC and Gateway installs immediately. | Continue reading


@threatpost.com | 4 years ago

Encryption Utility Firm Accused of Bundling Malware Functions in Product

The increasingly prevalent GuLoader malware has been traced back to a far-reaching encryption service that attempts, according to researchers. | Continue reading


@threatpost.com | 4 years ago

Microsoft Releases Emergency Security Updates for Windows 10, Server

The patches fix two separate RCE bugs in Windows Codecs that allow hackers to exploit playback of multimedia files. | Continue reading


@threatpost.com | 4 years ago

E.U. Authorities Crack Encryption of Criminal and Murder Network

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money. | Continue reading


@threatpost.com | 4 years ago

AWS Facial Recognition Misidentified over 100 Politicians as Criminals

Comparitech’s Paul Bischoff found that Amazon’s facial recognition platform misidentified an alarming number of people, and was racially biased. | Continue reading


@threatpost.com | 4 years ago