14 hours 53 minutes ago
The malware seems like a silly coding lark at first, but further exploration shows it can wreak serious damage in follow-on attacks.
Tara Seals
16 hours 14 minutes ago
Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next.
Tara Seals
18 hours 48 minutes ago
Sivan Tehila, cybersecurity strategist at Perimeter 81, discusses climate change and the cyber-resilience lessons companies should take away from dealing with the pandemic.
Sivan Tehila
3 days 13 hours ago
Two cyberattack campaigns are making the rounds using unique social-engineering techniques.
Tara Seals
3 days 14 hours ago
A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with a casino-like functionality.
Becky Bracken
3 days 16 hours ago
Widely deployed platforms from Citrix, Fortinet, Pulse Secure, Synacor and VMware are all in the crosshairs of APT29, bent on stealing credentials and more.
Tara Seals
3 days 20 hours ago
Matt Bromiley, senior principal consultant with Mandiant, offers checklists for how small- and medium-sized businesses (SMBs) can identify and clear ProxyLogon Microsoft Exchange infections.
Matt Bromiley
3 days 21 hours ago
The zero-day flaw research group has revised its disclosure of the technical details of vulnerabilities in the hopes of speeding up the release and adoption of fixes.
Elizabeth Montalbano
4 days 14 hours ago
A 100-day race to boost cybersecurity will rely on incentives rather than regulation, the White House said.
Becky Bracken
4 days 17 hours ago
The IoT-targeted malware has also added new exploits for initial compromise, for Huawei, Realtek and Dasan GPON devices.
Tara Seals
4 days 21 hours ago
Threat actors targeted compromised Exchange servers to host malicious Monero cryptominer in an “unusual attack,” Sophos researchers discovered.
Elizabeth Montalbano
5 days 13 hours ago
The vulnerability is triggered when a cloud container pulls a malicious image from a registry.
Tara Seals
5 days 14 hours ago
Not a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw.
Becky Bracken
5 days 16 hours ago
In a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand.
Tara Seals
5 days 16 hours ago
Joseph Carson, chief security scientist at Thycotic, discusses the death of data privacy and what comes next.
Joseph Carson
5 days 19 hours ago
Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains.
Elizabeth Montalbano
5 days 21 hours ago
Microsoft fixes 110 vulnerabilities, with 19 classified as critical and another flaw under active attack.
Tom Spring
6 days 13 hours ago
How this class of vulnerabilities will impact millions connected devices and potentially wreck the day of IT security professionals.
Tom Spring
6 days 13 hours ago
Researchers measured 648 new malware threats every minute during Q4 2020.
Becky Bracken
6 days 15 hours ago
Crooks are looking to harvest email credentials with a savvy campaign that uses the Typeform service to host the phishing page.
Tara Seals
Checked
4 hours 58 minutes ago
The First Stop For Security News
Subscribe to The Threat Post feed