The first stop for security news | Threatpost
Massive Malspam Campaign Finds a New Vector for FlawedAmmyy RAT
Hundreds of thousands of emails are delivering weaponized PDFs containing malicious SettingContent-ms files.
D-Link, Dasan Routers Under Attack In Yet Another Assault
Dasan and D-Link routers running GPON firmware are being targeted by hackers in an attempt to create a botnet.
Newsmaker Interview: Troy Mursch on Why Cryptojacking Isn’t Going Away
Criminals have found a mischievous way to mine cryptocurrency. Security researcher Troy Mursch sounds off on why this tricky trend isn't going away anytime soon.
ThreatList: A Ranking of Airports By Riskiest WiFi Networks
Airport TSA agents don’t check terminals for insecure WiFi networks, so stay on your toes when using hotspots at these airports.
Chinese Hackers Mount Espionage Campaign During Trump-Putin Summit
An uncharacteristic spate of strikes against IoT devices in Finland during the summit was likely an indicator of a coordinated cyberespionage effort, researchers said.
ThreatList: Sizing Up The Scourge of Credential-Stuffing
Over two billion credentials were stolen in 2017 and contributed to the complex problem of credential spills, credential stuffing and account takeover fraud.
Stealthy Malware Hidden in Images Takes to GoogleUserContent
Hackers are embedding malicious code within compromised, uploaded images on trusted Google sites – weaponizing the website and staying under the radar.
IoT Robot Vacuum Vulnerabilities Let Hackers Spy on Victims
Two vulnerabilities were discovered on Dongguan Diqee-branded vacuum cleaners, Thursday.
GangWang GPS Navigation Attack Leads Unsuspecting Drivers Astray
In a stalking or random criminal scenario, the ability to guide someone to an out-of-the-way, isolated location could be a precursor to kidnapping or worse.
How Cyber Insurance Changes the Conversation Around Risk
In this InfoSec Insider cyber insurance expert Nick Sanna discusses how to balance threat exposures and protecting assets with insurance against hacking, breaches and vulnerabilities.
Feed Fetched by RSS Dog.