2 days 2 hours ago
The new tools on Chrome and Edge will make it easier for browser users to discover - and change - compromised passwords.
Lindsey O'Donnell
2 days 2 hours ago
The "KindleDrip" attack would have allowed attackers to siphon money from unsuspecting victims.
Tara Seals
2 days 5 hours ago
A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.
Becky Bracken
2 days 5 hours ago
The CursedGrabber malware has infiltrated the open-source software code repository.
Tara Seals
2 days 6 hours ago
Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve.
Lindsey O'Donnell
2 days 11 hours ago
Netscout researchers identify more than 14,000 existing servers that can be abused by ‘the general attack population’ to flood organizations’ networks with traffic.
Elizabeth Montalbano
3 days 4 hours ago
Einstein is in violation of the the HHS 60-day breach notification rule, but unlikely to face penalty.
Becky Bracken
3 days 4 hours ago
Researchers have traced the origins of a campaign - infecting SQL servers to mine cryptocurrency - back to an Iranian software firm.
Lindsey O'Donnell
3 days 9 hours ago
Researchers warn that attackers are collecting reconnaissance for future business email compromise attacks using Google Forms.
Lindsey O'Donnell
3 days 10 hours ago
A phishing campaign spoofs Xerox notifications to lure victims into clicking on malicious HTML attachments.
Elizabeth Montalbano
4 days 2 hours ago
Cisco is stoppering critical holes in its SD-WAN solutions and its smart software manager satellite.
Lindsey O'Donnell
4 days 3 hours ago
The company also issued patches for Tesla-based GPUs as part of an updated, separate security advisory.
Tara Seals
4 days 6 hours ago
The attack vector was not the Orion platform but rather an email-protection application for Microsoft 365.
Tara Seals
4 days 7 hours ago
Users of dating apps - like Tinder, Match and Bumble - should be on the lookout for investment-fraud scammers.
Lindsey O'Donnell
4 days 8 hours ago
Mystery of spying using popular chat apps uncovered by Google Project Zero researcher.
Elizabeth Montalbano
5 days 2 hours ago
Seven flaws in open-source software Dnsmasq could allow DNS cache poisoning attacks and remote code execution.
Lindsey O'Donnell
5 days 3 hours ago
Joyce will replace Anne Neuberger, who is now deputy national security advisor for the incoming Biden administration.
Becky Bracken
5 days 7 hours ago
The post-compromise backdoor installs Cobalt Strike to help attackers more laterally through victim networks.
Tara Seals
5 days 8 hours ago
The FreakOut malware is adding infected Linux devices to a botnet, in order to launch DDoS and cryptomining attacks.
Lindsey O'Donnell
5 days 9 hours ago
Users of the Linux-based open-source firmware—which include developers from commercial router companies--may be targeted by phishing campaigns, administrators warn.
Elizabeth Montalbano
Checked
4 hours 1 minute ago
The First Stop For Security News
Subscribe to The Threat Post feed