Researchers demonstrated a possible way to track individuals via Bluetooth signals.
Threatpost
@threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
Threatpost’s Tweets
In an on-demand webinar with , learn about the challenges organizations face protecting sensitive information while maintaining access to remote systems.
Sign up now 👇
3
4
Malware loads itself from remote servers and bypasses Microsoft’s Defender AV scanner, according to reports.
17
16
Rob Gurzeev, CEO and Co-Founder of , explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
6
4
Devices from Cisco, Netgear and others at risk from the multi-stage #malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
1
16
10
Oliver Tavakoli, CTO at , gives us hope that surviving a #ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
9
4
Topics to follow
Sign up to get Tweets about the Topics you follow in your Home timeline.
Carousel
Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
1
17
9
Join Threatpost and Intel Security’s Tom Garrison in a live conversation about innovation enabling stakeholders to stay ahead of a dynamic threat landscape and what Intel learned from their latest study in partnership with Ponemon Institue.
1
7
1
Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks.
1
17
9
In an on-demand webinar with , learn about the challenges organizations face protecting sensitive information while maintaining access to remote systems.
Sign up now 👇
4
3
Shrav Mehta, CEO, , outlines the top six bad habits security teams need to break to prevent costly breaches, #ransomware attacks and prevent #phishing-based endpoint attacks.
1
7
9
CISA warns that threat actors are ramping up attacks against unpatched #Log4Shell vulnerability in VMware servers.
19
15
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
11
1
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.
12
6
One well crafted #phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.
1
25
23
An account promoting the project—which offers a range of threat activity from info-stealing to #crypto-mining to #ransomware as individual modules—has more than 500 subscribers.
1
9
4
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
12
6
Hackers escalate #phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.
18
17
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.
17
9
Deja-Vu data from this year’s DBIR report feels like we are stuck in the movie �?Groundhog Day.’
1
11
3
The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread #ransomware, #spyware or steal data from browser sessions, researchers warn.
16
6
The company is warning victims in Italy and Kazakhstan that they have been targeted by the #malware from Italian firm RCS Labs.
11
4
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.
18
11
#Ransomware shows no sign of abating and hackers are becoming more cautious and making risk/reward calculations before targeting companies.
13
8
Culture of �?insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices.