BofA Phish Gets Around Dmarc, Other Email Protections

The June campaign was targeted and aimed at stealing online banking credentials. | Continue reading


@threatpost.com | 4 years ago

LinkedIn ‘Job Offers’ Targets Aerospace, Military Firms with Malware

A recent malware campaign targeted victims at European and Middle East aerospace and military companies – via LinkedIn spear-phishing messages. | Continue reading


@threatpost.com | 4 years ago

WhatsApp Phone Numbers Pop Up in Google Search Results

A researcher found that phone numbers tied to WhatsApp accounts are indexed publicly on Google Search creating what he claims is a “privacy issue” for users. | Continue reading


@threatpost.com | 4 years ago

Two Critical Android Bugs Open Door to RCE

Google and Qualcomm both addressed significant vulnerabilities in their June updates. | Continue reading


@threatpost.com | 4 years ago

New iOS Jailbreak Tool Works on iPhone Models iOS 11 to iOS 13.5

Latest version of UnC0ver uses unpatched zero-day exploit to take complete control of devices, even those running iOS 13.5. | Continue reading


@threatpost.com | 4 years ago

Apple Patches Two iOS Zero-Days Abused for Years

Continue reading


@threatpost.com | 4 years ago

GoDaddy Hack Breaches Hosting Account Credentials

The domain registrar giant said that the breach started in October 2019. | Continue reading


@threatpost.com | 4 years ago

Shade Threat Actors Call It Quits, Release 750K Encryption Keys

The team behind the ransomware, first spotted in late 2014 and typically targeting Russian victims, apologized to victims in a post on GitHub. | Continue reading


@threatpost.com | 4 years ago

Saltstack Vulnerability Allow Full RCE as Root on Cloud Servers

Researchers say the bugs are easy to exploit and will likely be weaponized within a day. | Continue reading


@threatpost.com | 4 years ago

Nintendo Confirms Breach of 160k Accounts

After gamers reported unauthorized logins and purchases, Nintendo confirmed that over 160,000 accounts had been hacked. | Continue reading


@threatpost.com | 4 years ago

Bitcoin thieves backdoor 700 Ruby gems

Cybercriminals uploaded typosquatted malicious libraries to RubyGems, which contains open-source components that are used as basic application building blocks by software developers. | Continue reading


@threatpost.com | 4 years ago

Compromised Zoom Credentials Swapped in Underground Forums

Thousands of compromised Zoom credentials were discovered in underground forums as cybercriminals look to tap into the burgeoning remote workforce. | Continue reading


@threatpost.com | 4 years ago

Google Squashes High-Severity Flaws in Chrome Browser

Google is rolling out the newest Chrome browser version, 80.0.3987.162, in the coming days. | Continue reading


@threatpost.com | 4 years ago

New Mirai Variant ‘Mukashi’ Targets Zyxel NAS Devices

The botnet exploits a vulnerability discovered last month that can allow threat actors to remotely compromise and control devices. | Continue reading


@threatpost.com | 4 years ago

Microsoft's new Edge shares “persistent” device identifiers to back end servers

An academic study found Microsoft's Edge browser to be the least private, due to it sending device identifiers and web browsing pages to back-end servers. | Continue reading


@threatpost.com | 4 years ago

Loyalty Cards Targeted in Tesco Clubcard Attack

Around 600,000 of the supermarket's 12 million loyalty program members have been warned about a cyberattack. | Continue reading


@threatpost.com | 5 years ago

DoppelPaymer Ransomware Used to Steal Data from Supplier to SpaceX, Tesla

Cyber attack at Visser Precision, which builds custom parts for the aerospace and automotive industries, reveals sensitive company data. | Continue reading


@threatpost.com | 5 years ago

Data Breach Occurs at Agency in Charge of Secure White House Communications

A leak at the Defense Information Systems Agency exposed personal information of government employees, including social security numbers. | Continue reading


@threatpost.com | 5 years ago

Docker Registries Expose Hundreds of Orgs to Malware, Data Theft

Misconfigured Docker registries could leak confidential data, lead to a full-scale compromise and interrupt the business operations.” | Continue reading


@threatpost.com | 5 years ago

Malicious Chrome Extensions Impact Millions of Users

The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites. | Continue reading


@threatpost.com | 5 years ago

Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs

A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more. | Continue reading


@threatpost.com | 5 years ago

Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs

The release of Firefox 73 fixed high-severity memory safety bugs that could cause arbitrary code execution and missing bounds check that could enable memory corruption. | Continue reading


@threatpost.com | 5 years ago

Google Chrome to Bar HTTP File Downloads

Downloads of files like images may be banned if they use HTTP connections – even if they are available from an HTTPS website. | Continue reading


@threatpost.com | 5 years ago

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast

The researcher behind the five critical Cisco flaws, collectively called CDPwn, talks about why Layer 2 protocols are under-researched when it comes to security vulnerabilities. | Continue reading


@threatpost.com | 5 years ago

TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection

The tricky trojan evolves yet again, remaining one of the most advanced vehicles for delivering malware. | Continue reading


@threatpost.com | 5 years ago

New Bill Proposes NSA Surveillance Reforms

The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans. | Continue reading


@threatpost.com | 5 years ago

Mandatory IoT Security in the Offing with U.K. Proposal

The new U.K. law mandates that manufacturers apply several security controls to their connected devices. | Continue reading


@threatpost.com | 5 years ago

Google: Flaws in Apple’s Private-Browsing Technology Allow for Tracking

New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties. | Continue reading


@threatpost.com | 5 years ago

Microsoft Zero-Day Actively Exploited, Patch Forthcoming

CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover. | Continue reading


@threatpost.com | 5 years ago

Exploit Fully Breaks SHA-1, Lowers the Attack Bar

Users of GnuPG, OpenSSL and Git could be in danger from an attack that's practical for ordinary attackers to carry out. | Continue reading


@threatpost.com | 5 years ago

Hackers Deface U.S. Gov Website with Pro-Iran Messages

The Federal Depository Library Program (FDLP) website was defaced over the weekend to show a picture of a bloodied President Donald Trump. | Continue reading


@threatpost.com | 5 years ago

California Adopts Strictest Privacy Law in U.S.

On Wednesday California signed into law the strictest privacy law in the United States. | Continue reading


@threatpost.com | 5 years ago

Top Breaches and Leaky Server Screw Ups of 2019

2019 was a banner year for data exposures, with billions of people affected. | Continue reading


@threatpost.com | 5 years ago

Top IoT Disasters of 2019

From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019. | Continue reading


@threatpost.com | 5 years ago

Wawa Data Breach: Malware Stole Customer Payment Card Info

Wawa said that payment-processing system malware had potentially affected all 850 of its locations. | Continue reading


@threatpost.com | 5 years ago

Apple’s Bug Bounty Opens for Business, $1M Payout Included

The tech giant is looking for full working exploits with any vulnerability submission. | Continue reading


@threatpost.com | 5 years ago

Alexa, Google Home Eavesdropping Hack Not yet Fixed

Researchers say that Amazon and Google need to focus on weeding out malicious skills from the getgo, rather than after they are already live. | Continue reading


@threatpost.com | 5 years ago

Epilepsy Foundation Bombarded with Seizure-Triggering Twitter Posts

The Epilepsy Foundation has filed a criminal complaint against undisclosed Twitter users who users its Twitter feed to post seizure-inducing content. | Continue reading


@threatpost.com | 5 years ago

N.J.’S Largest Hospital System Pays Up in Ransomware Attack

The ransomware attack earlier this month led the hospital system to reschedule surgeries and appointments. | Continue reading


@threatpost.com | 5 years ago

AT&T, Verizon Subscribers Exposed as Mobile Bills Turn Up on the Open Web

Names, addresses, phone numbers, call and text message records and account PINs were all caught up in a cloud misconfiguration. | Continue reading


@threatpost.com | 5 years ago

DHS Plans to Expand Facial Recognition Border Checks

Now all travelers to and from the U.S. – even if they are U.S. citizens – will be subject to facial recognition-based checks, a new filing revealed. | Continue reading


@threatpost.com | 5 years ago

Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts

Prosecution asks for imprisonment of the hacker who stole nude photos and other personal data from women’s iCloud accounts and then distributed some of the material online. | Continue reading


@threatpost.com | 5 years ago

‘Ultimate’ MiTM Attack Steals $1M from Israeli Startup

Researchers uncovers “ultimate man-in-the-middle attack” that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business. | Continue reading


@threatpost.com | 5 years ago

Iran Targets Mideast Oil with ZeroCleare Wiper Malware

Likely the work of APT34, ZeroCleare is bent on destruction and disruption, rather than information-stealing. | Continue reading


@threatpost.com | 5 years ago

Microsoft OAuth Flaw Opens Azure Accounts to Takeover

The Microsoft applications are vulnerable to an OAuth authentication flaw that could enable Azure account takeover. | Continue reading


@threatpost.com | 5 years ago

Federal Data Privacy Bill Takes Aim at Tech Giants

The COPRA legislation would provide GDPR-like data protections, and create a new FTC enforcement bureau. | Continue reading


@threatpost.com | 5 years ago

Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security. | Continue reading


@threatpost.com | 5 years ago

Critical Flaws in VNC Threaten Industrial Environments

Some of the bugs allow remote code-execution. | Continue reading


@threatpost.com | 5 years ago