1.8M+ attacks, against half of all corporate networks, are attempting to exploit #Log4Shell, including with a new ransomware called #Khonsari.
Thanks for the input, .
#cybersecurity
Threatpost
@threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
threatpost.comJoined January 2009
Threatpost’s Tweets
Hard to believe, but there are other security matters to attend to beside Logapalooza. #cybersecurity Shout-out to for ever-great #PatchTuesday analysis.
2
14
7
There’s a sea of unstructured data on the internet relating to the latest #cybersecurity threats. Join Threatpost’s live #virtualroundtable to learn how natural language processing can add context (without being an expert!) with .
#Sponsored
10
5
The flaws, discovered by , could enable attackers to disable security and gain kernel-level privileges. They affect Amazon WorkSpaces and other cloud services that use the USB Over Ethernet tool from Eltima’s SDK.
#cybersecurity
37
20
Critical security vulnerabilities in ’s Secure Mobile Access (SMA) 100-series VPN appliances could allow an unauthenticated, remote user to execute code as root.
#cybersecurity
31
13
Attackers are milking unpatched #Hikvision video systems to drop a DDoS botnet, researchers warned.
#cybersecurity
1
20
13
Topics to follow
Sign up to get Tweets about the Topics you follow in your Home timeline.
Carousel
DoH! ’s Nate Warfield discusses new stealth tactics threat actors are using for C2, including Malleable C2 from Cobalt Strike’s arsenal, and how DNS over HTTPS (DoH) can boost user privacy.
#Cybersecurity #infosecinsider
15
11
Buckle up! The rapid spread of #Emotet via #TrickBot and its behavior since it re-emerged last month augur a spate of ransomware attacks, warn , & researchers.
#cybersecurity
33
24
We want to know what your biggest #cloudsec concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive, anonymous Threatpost Poll! #cybersecurity
1
10
3
Most industry analyst firms conclude that between 80-90 percent of network traffic is encrypted today. Jeff Costlow, CISO at , explains why this might not be a good thing.
#Cybersecurity #infosecinsider
2
13
8
Perry Mason it ain’t: Cybercrooks have set up their own system for settling disputes, handing over ultimate decision-making to senior underground forum administrators who’ve awarded claims totaling as much as $20M. Report from .
#cybersecurity
24
15
Tony Lauro, director of Security Technology & Strategy at , discusses VPNs, RDP, flat networks, BYOD and other network-security bugbears.
#Cybersecurity #infosecinsider
10
6
We want to know what your biggest #cloudsec concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive, anonymous Threatpost Poll! #cybersecurity
8
3
Being pestered by pesky, repetitive MFA push notifications? Careful: That's one of #Nobelium’s new shticks. Thanks for your thoughts on this one, .
#cybersecurity
9
8
Hey, tune in for the AMA session at 8pm ET if you want to find out more on the breach from BitMart! Thanks for your input, . #cybersecurity
10
3
We want to know what your biggest #cloudsec concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive, anonymous Threatpost Poll! #cybersecurity
10
1
Not everybody’s paying up: The #Cuba ransomware gang has taken in a little more than half of the $74 million that it’s demanded, according to an flash alert. Thanks for the input, . #cybersecurity
8
3
Some of the world’s largest companies have exposed reams of sensitive information from the cloud, researchers said – thanks to misconfigured #Kafdrop instances.
#cybersecurity
13
9
Jason Kent, hacker-in-residence at , found a way to exploit a #API to get around the hassle of car shopping in the age of supply-chain woes.
#Cybersecurity #infosecinsider
9
8