‘Windows Update’ Installs Cyborg Ransomware

An executable file disguised as a .jpg leads not only to ransomware but also its builder, which can be used to create variants. | Continue reading


@threatpost.com | 5 years ago

Tianfu Cup Round-Up: Safari, Chrome, D-Link Routers and Office 365 Hacked

White-hat hackers using never-before-seen zero days against popular applications and devices against competed at two-day gathering in Chengdu. | Continue reading


@threatpost.com | 5 years ago

The Unhappiest Subscribers on Earth? Disney+ Accounts Hacked and Hijacked

Thousands of accounts showed up on the Dark Web — and customers say Disney has been no help. | Continue reading


@threatpost.com | 5 years ago

Lizard Squad Threatens UK’s Labour Leader with Cyberattacks Against His Family

The threats follow an DDos attack bent on taking out the Labour Party's online presence. | Continue reading


@threatpost.com | 5 years ago

Microsoft Patches RCE Bug Actively Under Attack

Microsoft tackles 74 bugs as part of its November Patch Tuesday security bulletin. | Continue reading


@threatpost.com | 5 years ago

Threat Actor Impersonates USPS to Deliver Backdoor Malware

The campaign is consistent with emerging tactics from bad actors to use increasingly sophisticated social engineering and spoofing to deliver malware. | Continue reading


@threatpost.com | 5 years ago

Intel Warns of Critical Info-Disclosure Bug in Security Engine

The issue is in an Intel chip used for remote management. | Continue reading


@threatpost.com | 5 years ago

Microsoft to Apply California’s Privacy Law to All U.S. Users

The move takes a broader stand to protect user data and support the requirements of CCPA nationwide. | Continue reading


@threatpost.com | 5 years ago

Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories. | Continue reading


@threatpost.com | 5 years ago

Facebook Privacy Breach: 100 Developers Improperly Accessed Data

Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu. | Continue reading


@threatpost.com | 5 years ago

Alexa, Siri, Google Smart Speakers Hacked via Laser Beam

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands. | Continue reading


@threatpost.com | 5 years ago

Valve Source Engine, Fortnite Servers Crippled by Gafgyt Variant

Servers hosting Valve Source Engine and popular games like Fortnite are targeted by a new variant of the Gafgyt botnet. | Continue reading


@threatpost.com | 5 years ago

China-Linked Hackers Spy on Texts with MessageTap Malware

Chinese state-sponsored hackers are attacking telecom networks to sniff out SMS messages that contain keywords revolving around political dissidents. | Continue reading


@threatpost.com | 5 years ago

Fake Voicemail/Office 365 Attack Targets Enterprise Execs

Executives at high-profile companies are being targeted by a fake voicemail campaign hunting for Office 365 credentials. | Continue reading


@threatpost.com | 5 years ago

Australia Proposes Facial Recognition for Adult Sites

The proposal would require biometrics systems to verify age before allowing visits to adult sites. | Continue reading


@threatpost.com | 5 years ago

Fancy Bear Targets Sporting, Anti-Doping Orgs as 2020 Olympics Loom

The APT is once again targeting the sports world, Microsoft warns. | Continue reading


@threatpost.com | 5 years ago

PHP Bug Allows Remote Code-Execution on Nginx Servers

CVE-2019-11043 is trivial to exploit — and a proof of concept is available. | Continue reading


@threatpost.com | 5 years ago

U.N., Unicef, Red Cross Under Ongoing Mobile Attack

A smart mobile-first phishing effort uses valid certificates to sign fake Office 365 pages, and logs keystrokes in real time. | Continue reading


@threatpost.com | 5 years ago

7M Adobe Creative Cloud Users Exposed to Hackers

An open cloud database sets the stage for phishing attacks for users of the subscription service. | Continue reading


@threatpost.com | 5 years ago

Ransomware, Mobile Malware Attacks to Surge in 2020

Targeted ransomware, mobile malware and other attacks will surge, while companies will adopt AI, better cloud security and cyber insurance to help defend and protect against them. | Continue reading


@threatpost.com | 5 years ago

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

A pair of bugs in the Kubernetes open-source cloud container software can be “highly dangerous” under some Kubernetes configurations, according to researchers. The flaws, CVE-2019-16276 and CVE-2019-11253, have been patched in Kubernetes builds 1.14.8, 1.15.5 and 1.16.2. Exploita … | Continue reading


@threatpost.com | 5 years ago

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Consumers don't vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ | Continue reading


@threatpost.com | 5 years ago

Magecart 5 Linked to Carbanak Gang

The Magecart splinter group known for supply-chain attacks appears to be tied to advanced threat actors. | Continue reading


@threatpost.com | 5 years ago

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Karsten Nohl, who was behind this week’s research that outlined new eavesdropping hacks for Alexa and Google Home, says that privacy for smart home assistants still has a ways to go. | Continue reading


@threatpost.com | 5 years ago

U.S. Government, Military Personnel Data Leaked by Autoclerk

The travel reservation data, along with personal details, of hundreds of thousands was discovered in a database exposed online for all to see. | Continue reading


@threatpost.com | 5 years ago

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise

A patch is currently under revision but has not yet been incorporated into the Linux kernel. | Continue reading


@threatpost.com | 5 years ago

Sophisticated Spy Kit Targets Russians with Rare GSM Plugin

The Attor malware targets government and diplomatic victims with unusual tactics. | Continue reading


@threatpost.com | 5 years ago

Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends

Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company. | Continue reading


@threatpost.com | 5 years ago

Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics

A campaign first observed last year has ramped up its attack methods and appears to be linked to activity targeting President Trump’s 2020 re-election campaign. | Continue reading


@threatpost.com | 5 years ago

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device. | Continue reading


@threatpost.com | 5 years ago

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps. | Continue reading


@threatpost.com | 5 years ago

Microsoft Blacklists Dozens of New File Extensions in Outlook

In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails. | Continue reading


@threatpost.com | 5 years ago

‘Narrator’ Windows Utility Trojanized to Gain Full System Control

An active APT campaign aimed at tech companies is underway, which also uses a legitimate NVIDIA graphics function. | Continue reading


@threatpost.com | 5 years ago

Wikipedia, World of Warcraft Downed by Weekend DDoS Attacks

Wikipedia and World of Warcraft Classic users reported global outages over the weekend in targeted – and connected – DDoS attacks. | Continue reading


@threatpost.com | 5 years ago

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices. | Continue reading


@threatpost.com | 5 years ago

Malicious Ad Blockers for Chrome Caught in Ad Fraud Scheme

'AdBlock' and 'uBlock' impersonate legitimate extensions but instead engage in cookie stuffing to defraud affiliate marketing programs, a researcher has found. | Continue reading


@threatpost.com | 5 years ago

200K Sign Petition Against Equifax Data Breach Settlement

A Change.org petition is demanding stronger accountability for Equifax in the 2017 leak that affected 150 million customers. | Continue reading


@threatpost.com | 5 years ago

Microsoft IE Zero-Day Flaw Addressed in Out-of-Band Security Update

Microsoft has issued a patch for an Internet Explorer remote code execution flaw that is being actively exploited in the wild. | Continue reading


@threatpost.com | 5 years ago

Payment Card Breach Hits 8 Cities Using Vulnerable Bill Portal

Eight cities have been hit by a data breach targeting payment cards. | Continue reading


@threatpost.com | 5 years ago

Asus, Lenovo and Other Routers Riddled with Remotely Exploitable Bugs

Independent researchers found 125 different CVEs across 13 different router and NAS models. | Continue reading


@threatpost.com | 5 years ago

Panda Threat Group Mines for Monero with Updated Payload, Targets

Though harboring unsophisticated payloads, the Panda threat group has updated its tactics – from targets to infrastructure – and successfully mined hundreds of thousands of dollars using cryptomining malware. | Continue reading


@threatpost.com | 5 years ago

AMD Radeon Graphics Cards Open VMware Workstations to Attack

Bug impacts VMware Workstation 15 running 64-bit versions of Windows 10 as the guest VM. | Continue reading


@threatpost.com | 5 years ago

New Threat Actor Fraudulently Buys Digital Certificates to Spread Malware

ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market. | Continue reading


@threatpost.com | 5 years ago

Joker Spyware Found in 24 Google Play Apps

Google has kicked 24 apps off of its official Android app marketplace after spyware was discovered in them. | Continue reading


@threatpost.com | 5 years ago

Gamification Can Transform Company Cybersecurity Culture

Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture. | Continue reading


@threatpost.com | 5 years ago

IoT Radio Telnet Backdoor and ‘SimJacker’ Active Exploit

Threatpost editors Tara Seals and Lindsey O'Donnell talk about the top news stories of the week – from leaky databases to SIM card attacks. | Continue reading


@threatpost.com | 5 years ago

Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses. | Continue reading


@threatpost.com | 5 years ago

iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts

Apple will not fix the glitch until the release of iOS 13.1 later in September. | Continue reading


@threatpost.com | 5 years ago