Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk

The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much. | Continue reading


@threatpost.com | 5 years ago

Near-Ubiquitous Critical Microsoft RCE Bugs Affect All Versions of Windows

The two CVEs allow bypasses to get around NTLM relay attack mitigations. | Continue reading


@threatpost.com | 5 years ago

US Customs and Border Patrol Facial Recognition Database Hacked

A recent breach of U.S. Customs and Border Protection traveler photo and license plate data has led experts to condemn the collection and storage of facial recognition data. | Continue reading


@threatpost.com | 5 years ago

SandboxEscaper Debuts ByeBear Windows Patch Bypass

SandboxEscaper is back, with a second bypass for the recent CVE-2019-0841 Windows patch. | Continue reading


@threatpost.com | 5 years ago

Linux Command-Line Editors Vulnerable to High-Severity Bug

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations. | Continue reading


@threatpost.com | 5 years ago

Microsoft Warns of Email Attacks Executing Code Using an Old Bug

The flaw affected all versions of Microsoft Office, Microsoft Windows and architecture types dating back to 2000, and was patched in November 2017. | Continue reading


@threatpost.com | 5 years ago

VLC Player Gets Patched for Two High-Severity Bugs

Popular media player receives 33 security bug fixes, two of which are rated high severity. | Continue reading


@threatpost.com | 5 years ago

Forget BlueKeep: Beware the GoldBrute

A botnet has appeared that has attempted to brute-force 1.5 million RDP connections to Windows systems in the last few days — and counting. | Continue reading


@threatpost.com | 5 years ago

BlueKeep ‘Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover

A working exploit for the critical remote code-execution flaw shows how an unauthenticated attacker can achieve full run of a victim machine in about 22 seconds. | Continue reading


@threatpost.com | 5 years ago

macOS Zero-Day Allows Trusted Apps to Run Malicious Code

Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Mojave, despite mitigations. | Continue reading


@threatpost.com | 5 years ago

Snapchat Privacy Blunder Piques Concerns About Insider Threats

After a report found that Snap employees were abusing their access to Snapchat data, experts are warning that insider threats will continue to be a top challenge for privacy. | Continue reading


@threatpost.com | 5 years ago

WordPress Plugin Has Unpatched Privilege Escalation Flaw, Warn Researchers

Researchers are warning of flaws in two WordPress plugins – Slick Popup and WP Database Backup – including one that remains unpatched. | Continue reading


@threatpost.com | 5 years ago

Nvidia Fixes High-Severity Flaws in GeForce Experience for Gamers

Nvidia is urging gamers to update its GeForce Experience software after patching two high-severity vulnerabilities. | Continue reading


@threatpost.com | 5 years ago

Windows Zero-Day Drops on Twitter, Developer Promises 4 More

SandboxEscaper has released her latest local privilege-escalation exploit for Windows. | Continue reading


@threatpost.com | 5 years ago

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see. | Continue reading


@threatpost.com | 5 years ago

Slack Bug Allows Remote File Hijacking, Malware Injection

An attacker can supply a malicious hyperlink in order to secretly alter the download path for files shared in a Slack channel. | Continue reading


@threatpost.com | 5 years ago

Billions of Malicious Bots Take to Cipher-Stunting to Hide

Attackers have been tampering with TLS signatures at a scale never before seen using the cipher-stunting approach. | Continue reading


@threatpost.com | 5 years ago

'Unhackable' Biometric USB Offers Up Passwords in Plain Text

A simple Wireshark analysis was enough to subvert the gadget, which uses iris identification to protect the drive. | Continue reading


@threatpost.com | 5 years ago

Hackers Take over IoT Devices to ‘Click’ on Ads

A video interview and Q&A with IoT specialist Dan Demeter of Kaspersky Lab. | Continue reading


@threatpost.com | 5 years ago

Researchers Compromise Netflix Content in Widevine DRM Hack

A bug in the popular anti-piracy framework allows a side-channel attack on premium content. | Continue reading


@threatpost.com | 5 years ago

Ubiquitous Bug Allows Hipaa-Protected Malware to Hide Behind Medical Images

The ubiquitous nature of the flaw opens the door for rapidly spreading, crippling cyberattacks. | Continue reading


@threatpost.com | 5 years ago

Weather Channel Knocked Off-Air in Dangerous Precedent

The incident was the work of malicious cyberattackers. | Continue reading


@threatpost.com | 5 years ago

Oracle Squashes 53 Critical Bugs in April Security Update

Overall Oracle patched 297 flaws across multiple product as part of its April security update. | Continue reading


@threatpost.com | 5 years ago

State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally

An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks. | Continue reading


@threatpost.com | 5 years ago

Windows Zero-Day Emerges in Active Exploits

Patched just last week, the Windows kernel bug is being used for full system takeover. | Continue reading


@threatpost.com | 5 years ago

TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids

A popular Australian smartwatch's tracking capabilities expose its user's locations, personal data and more. | Continue reading


@threatpost.com | 5 years ago

Exodus Spyware Found Targeting Apple iOS Users

The surveillance tool was signed with legitimate Apple developer certificates. | Continue reading


@threatpost.com | 5 years ago

Financial Apps Are Ripe for Exploit via Reverse Engineering

White hat hacker reverse engineers financial apps and finds a treasure trove of security issues. | Continue reading


@threatpost.com | 5 years ago

Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks

Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions. | Continue reading


@threatpost.com | 5 years ago

Hackers Take Down Safari, VMWare and Oracle at Pwn2Own

On the first day of Pwn2Own 2019 hackers poked holes in Apple Safari, VMware Workstation and Oracle VirtualBox. | Continue reading


@threatpost.com | 5 years ago

CUJO Firewall RCE's

Some of the flaws would allow remote code-execution. | Continue reading


@threatpost.com | 5 years ago

Researcher Won't Disclose MacOS Keychain 0 Day Without Apple Bug Bounty Program

A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program. | Continue reading


@threatpost.com | 6 years ago

Google Patches Critical .PNG Image Bug

Eleven critical bugs will be patched as part of the February Android Security Bulletin. | Continue reading


@threatpost.com | 6 years ago

The APT Name Game: How Grim Threat Actors Get Goofy Monikers

How do advanced persistent threat groups such as Double Secret Octopus and Anchor Panda get their ridiculous names? | Continue reading


@threatpost.com | 6 years ago

SpeakUp Linux Backdoor Sets Up for Major Attack

Armed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive. | Continue reading


@threatpost.com | 6 years ago

Airbus Data Takes Flight; and Billions of Credentials Dumped on Dark Web

A cyberattack lifts employee data at the French aerospace giant as news hits of "Collections 2-5" being passed around the underground. | Continue reading


@threatpost.com | 6 years ago

'Chaos' iPhone X Attack Alleges Remote Jailbreak

The attack makes use of previously disclosed critical vulnerabilities in the Apple Safari web browser and iOS. | Continue reading


@threatpost.com | 6 years ago

Web Apps Can Turn Browser Extensions into Backdoors

Researchers show how rogue web applications can be used to attack vulnerable browser extensions in a hack that gives adversaries access to private user data. | Continue reading


@threatpost.com | 6 years ago

U.S. Government Shutdown Leaves Dozens of .Gov Websites Vulnerable

As the shutdown continues into its 21st day, dozens of .gov websites haven't renewed their TLS certificates. | Continue reading


@threatpost.com | 6 years ago

Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In

A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means. | Continue reading


@threatpost.com | 6 years ago

The Promise and Peril of 5G

As the hype at CES demonstrates, 5G is the newest and shiniest tech bauble out there: but security concerns loom. | Continue reading


@threatpost.com | 6 years ago

UnCAPTCHA AI Cracks Google ReCAPTCHAs with 90% Accuracy

A proof-of-concept from the University of Maryland can defeat the audio challenges that are offered as an option for people with disabilities. | Continue reading


@threatpost.com | 6 years ago

First-Ever UEFI Rootkit Discovered in the Wild

Researcher at ESET outlines research on the first successful UEFI rootkit used in the wild. | Continue reading


@threatpost.com | 6 years ago

Hackers Dump Thousands of NASA Employee Records to Dark Web

Twelve years' worth of data has blasted off into the Dark Web. | Continue reading


@threatpost.com | 6 years ago

Amazon Sends 1,700 Alexa Voice Recordings to a Random Person

The intimate recordings paint a detailed picture of a man’s life. | Continue reading


@threatpost.com | 6 years ago

Android Trojan Targets PayPal Users

The trojan purports to be a battery optimization app – and then steals up to 1,000 euro from victims' PayPal accounts. | Continue reading


@threatpost.com | 6 years ago

Infected WordPress Sites Are Attacking Other WordPress Sites

Researchers identified a widespread campaign of brute force attacks against WordPress websites. | Continue reading


@threatpost.com | 6 years ago

The Nature of Mass Exploitation Campaigns

Examples of how attackers carry out mass exploitation campaigns and how to defend against them. | Continue reading


@threatpost.com | 6 years ago