Threatpost
●Podcasts
●Malware
●Vulnerabilities
●InfoSec Insiders
●Webinars
Featured news
2.5 million people were affected, in a breach that could spell more trouble down the line.
byNate Nelson
byNate Nelson
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
byNate Nelson
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
byNate Nelson
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
byNate Nelson
Threatpost Content Spotlight
●Podcasts
●Webinars
●eBooks
Listen Now
Listen Now
Listen Now
Listen Now
On-Demand Webinar
On-Demand Webinar
On-Demand Webinar
On-Demand Webinar
Download Your Free Copy
Download Your Free Copy
Download Your Free Copy
Download Your Free Copy
Latest news
byNate Nelson
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
byNate Nelson
byThreatpost
Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
byThreatpost
byThreatpost
CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
byThreatpost
byNate Nelson
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
byNate Nelson
byElizabeth Montalbano
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
byElizabeth Montalbano
Most popular
Newsmaker Interviews
4
2
1
Most Recent ThreatLists
2
7
This edition of the Threatpost podcast is sponsored by Egress.
Sponsored Content
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s […]
Sponsored Content
In this podcast, we dive into the 2022 edition of the State of Secrets Sprawl report with Mackenzie Jackson, developer advocate at GitGuardian. We talk issues that corporations face with public leaks from groups like Lapsus and more, as well as ways for developers to keep their code safe.
Sponsored Content
Fortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams.
Sponsored Content
1
Huntress Labs R&D Director Jamie Levy busts the old “Macs don’t get viruses” myth and offers tips on how MacOS malware differs and how to protect against it.
1
Mystified? Now’s the time to learn about cryptocurrency-associated risks: Listen to KnowBe4’s Dr. Lydia Kostopoulos explain blockchain, NFTs and how to stay safe.
Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according to a new Cequence Security report. Hacker-in-residence Jason Kent explains the latest.
Sponsored Content
1
It’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill. As it is, visibility into adversary behavior has been muck.
The ransomware group’s benefits – bonuses, employee of the month, performance reviews & top-notch training – might be better than yours, says BreachQuest’s Marco Figueroa.
View all podcasts
The APT, which targets Middle-Eastern energy firms & telecoms, has been relatively quiet since its exposure but not entirely silent. It’s kept up attacks through 2021 and is working on retooling its arsenal yet again.
TALON, a network of smart, connected security cameras developed by the Atlanta-based startup and installed by law enforcement around the country, raises surveillance-related privacy concerns.
4
From TrickBot to Ryuk, more malware cybercriminal groups are putting their heads together when attacking businesses.
The money being wire transferred by business email compromise victims is on the rise, as cybersecurity criminals evolve their tactics.
1
Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks.
From ransomware attacks that crippled hospitals, to espionage attacks targeting COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security risks.
Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty hunters, bug bounty program adoption and more.
How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike.
Ahead of the November U.S. elections, cybercriminals are stepping up their offensive in both attacks against security infrastructure and disinformation campaigns – but this time, social media giants, the government and citizens are more prepared.
View all videos
Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.
Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.
2019 was a tumultuous year for Facebook as it continued to grapple with privacy fallout after Cambridge Analytica, as well as dealing with a slew of security challenges.
2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take a look back.
1
From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children’s connected toys, here are the top IoT disasters in 2019.
1
Here are 10 top malware trends to watch for in the New Year.
The top cybersecurity and privacy trends that biggest impact in 2018.
3
What are the top cyber trends to watch out for in 2019? Here’s what we’re hearing.
10
A look back at the blizzard of breaches that made up 2018.
2
View all slideshows
Threatpost
The First Stop For Security News
●Home
●About Us
●Contact Us
●RSS Feeds
●Copyright © 2024 Threatpost
●Privacy Policy
●Terms and Conditions
Topics
●Black Hat
●Breaking News
●Cloud Security
●Critical Infrastructure
●Cryptography
●Facebook
●Government
●Hacks
●IoT
●Malware
●Mobile Security
●Podcasts
●Privacy
●RSAC
●Security Analyst Summit
●Videos
●Vulnerabilities
●Web Security
Threatpost
Topics
●Cloud Security
●Malware
●Vulnerabilities
●Privacy
Show all
●Black Hat
●Critical Infrastructure
●Cryptography
●Facebook
●Featured
●Government
●Hacks
●IoT
●Mobile Security
●Podcasts
●RSAC
●Security Analyst Summit
●Slideshow
●Videos
●Web Security
Authors
●Elizabeth Montalbano
●Nate Nelson
Threatpost
●Home
●About Us
●Contact Us
●RSS Feeds
InfoSec Insider
Infosec Insider Post
Infosec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored
Sponsored Content
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.