FreshRSS

πŸ”’
☐ β˜† βœ‡ The first stop for security news | Threatpost

Securing Your Move to the Hybrid Cloud

By Infosec Contributor β€” August 1st 2022 at 13:29
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

By Elizabeth Montalbano β€” July 28th 2022 at 17:24
Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwart a popular way to deliver malicious phishing payloads.
☐ β˜† βœ‡ The first stop for security news | Threatpost

IoT Botnets Fuels DDoS Attacks – Are You Prepared?

By Sponsored Content β€” July 26th 2022 at 12:38
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. This is a dangerous warning that the possibility of a sophisticated DDoS attack and a prolonged service outage will prevent businesses from growing.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Why Physical Security Maintenance Should Never Be an Afterthought

By Infosec Contributor β€” July 25th 2022 at 11:00
SecuriThings' CEO Roy Dagan tackles the sometimes overlooked security step of physical security maintenance and breaks down why it is important.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

By Aamir Lakhani β€” July 20th 2022 at 12:35
Aamir Lakhani, with FortiGuard Labs, answers the question; Why is the Conti ransomware gang targeting people and businesses in Costa Rica?
☐ β˜† βœ‡ The first stop for security news | Threatpost

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

By Elizabeth Montalbano β€” July 20th 2022 at 12:14
300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Authentication Risks Discovered in Okta Platform

By Nate Nelson β€” July 19th 2022 at 15:33
Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational data destruction.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Google Boots Multiple Malware-laced Android Apps from Marketplace

By Elizabeth Montalbano β€” July 18th 2022 at 12:32
Google removed eight Android apps, with 3M cumulative downloads, from its marketplace for being infected with a Joker spyware variant.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Large-Scale Phishing Campaign Bypasses MFA

By Elizabeth Montalbano β€” July 13th 2022 at 11:45
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
☐ β˜† βœ‡ The first stop for security news | Threatpost

How War Impacts Cyber Insurance

By Infosec Contributor β€” July 12th 2022 at 12:20
Chris Hallenbeck, CISO for the Americas at Tanium, discusses the impact of geopolitical conflict on the cybersecurity insurance market.
☐ β˜† βœ‡ The first stop for security news | Threatpost

β€˜Callback’ Phishing Campaign Impersonates Security Firms

By Elizabeth Montalbano β€” July 12th 2022 at 11:43
Victims instructed to make a phone call that will direct them to a link for downloading malware.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Rethinking Vulnerability Management in a Heightened Threat Landscape

By Infosec Contributor β€” July 11th 2022 at 20:26
Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Google Patches Actively Exploited Chrome Bug

By Elizabeth Montalbano β€” July 5th 2022 at 11:54
The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code.
☐ β˜† βœ‡ The first stop for security news | Threatpost

A Guide to Surviving a Ransomware Attack

By Oliver Tavakoli β€” June 30th 2022 at 11:59
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Leaky Access Tokens Exposed Amazon Photos of Users

By Nate Nelson β€” June 29th 2022 at 20:18
Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
❌