Threat Post

The First Stop For Security News
  1. The malware is back after three years, looking to cash in on interest in government relief efforts around coronavirus.
  2. The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.
  3. CVE-2020-10245, a heap-based buffer overflow that rates 10 out of 10 in severity, exists in the CODESYS web server and takes little skill to exploit.
  4. The food container company's main website had a card skimmer that scooped up online customers' payment card data.
  5. The malware, the work of a new APT called TwoSail Junk, allows deep surveillance and total control over iOS devices.
  6. Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.
  7. The router DNS hijacking attacks have targeted more than a thousand victims with the Oski info-stealing malware.
  8. Threatpost Senior Editor Tara Seals is joined by Russ Mohr, engineer and Apple evangelist at MobileIron along with Jerry Ray, COO at SecureAge, for a discussion about the now postponed Tokyo Games and its use of 5G and the myriad of security concerns Japan is preparing for.
  9. Apple's security update included a slew of vulnerabilities in various components of iOS, macOS and Safari - the most severe of which could enable remote code execution.
  10. Researchers say that APT41's exploits are part of one of the broadest espionage campaigns they've seen from a Chinese-linked actor "in recent years."

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form