Threat Post

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion

Threat Post - Thu, 10/17/2019 - 4:17pm
A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims.
Categories: Threat Post

Hacking Back? BriansClub Dark Web Attack a Boon for Banks

Threat Post - Thu, 10/17/2019 - 1:28pm
The theft of 26 million card records from an underground site offers valuable intel for banks.
Categories: Threat Post

Trump Campaign Website Left Open to Email Server Hijack

Threat Post - Thu, 10/17/2019 - 11:03am
A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trump’s official campaign website.
Categories: Threat Post

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws

Threat Post - Thu, 10/17/2019 - 10:35am
Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices.
Categories: Threat Post

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

Threat Post - Thu, 10/17/2019 - 10:25am
A pair of bugs in the Kubernetes open-source cloud container software can be “highly dangerous” under some Kubernetes configurations, according to researchers. The flaws, CVE-2019-16276 and CVE-2019-11253, have been patched in Kubernetes builds 1.14.8, 1.15.5 and 1.16.2. Exploitation of the first issue, CVE-2019-16276, is “very simple,” according to Ariel Zelivansky and Aviv Sasson at Palo […]
Categories: Threat Post

10 Steps for Ransomware Protection

Threat Post - Wed, 10/16/2019 - 4:12pm
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.
Categories: Threat Post

Silent Librarian Retools Phishing Emails to Hook Student Credentials

Threat Post - Wed, 10/16/2019 - 1:54pm
Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.
Categories: Threat Post

.WAVs Hide Malware in Their Depths in Innovative Campaign

Threat Post - Wed, 10/16/2019 - 12:50pm
Three different loaders and two payloads are hiding in audio files.
Categories: Threat Post

Docker Containers Riddled with Graboid Crypto-Worm

Threat Post - Wed, 10/16/2019 - 11:28am
A worm with a randomized propagation method is spreading via the popular container technology.
Categories: Threat Post

Podcast: Departing Employees Could Mean Departing Data

Threat Post - Wed, 10/16/2019 - 9:00am
Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.
Categories: Threat Post

New Presentation Template: Incident Response Reporting for Management

Threat Post - Wed, 10/16/2019 - 9:00am
For many security decision-makers, the real challenge is communicating the ongoing IR process to their management.
Categories: Threat Post

Cybercrime Tool Prices Bump Up in Dark Web Markets

Threat Post - Wed, 10/16/2019 - 8:45am
A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.
Categories: Threat Post

Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report

Threat Post - Wed, 10/16/2019 - 8:27am
A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.
Categories: Threat Post

Unencrypted Mobile Traffic on Tor Network Leaks PII

Threat Post - Tue, 10/15/2019 - 5:02pm
Researchers create digital dossiers of mobile users scraped from Tor network traffic.
Categories: Threat Post

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Threat Post - Tue, 10/15/2019 - 5:01pm
Unknown, vulnerable systems are present in nearly every ship environment that researchers have pen-tested.
Categories: Threat Post

Fake iOS Jailbreak Site Lures in Apple Users

Threat Post - Tue, 10/15/2019 - 12:05pm
A fake website purports to enable iPhone users to download an iOS jailbreak - but ultimately prompts them to download a gaming app and conducts click fraud.
Categories: Threat Post

Sudo Bug Opens Root Access on Linux Systems

Threat Post - Tue, 10/15/2019 - 11:55am
The bug allows users to bypass privilege restrictions to execute commands as root.
Categories: Threat Post

Pitney Bowes Hit with Ransomware Attack

Threat Post - Tue, 10/15/2019 - 8:04am
The attack left customers unable to access key services for shipping and mailing, the company said.
Categories: Threat Post

A Deepfake Deep Dive into the Murky World of Digital Imitation

Threat Post - Tue, 10/15/2019 - 8:00am
Deepfake technology is becoming easier to create – and that’s opening the door for a new wave of malicious threats, from revenge porn to social-media misinformation.
Categories: Threat Post

Apple Shares Some Browsing History with Chinese Company

Threat Post - Mon, 10/14/2019 - 8:22am
The company acknowledged it’s using ‘safe browsing’ technology from Tencent, which has ties to the Chinese government.
Categories: Threat Post