Threat Post

The First Stop For Security News
  1. Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.
  2. The WeLeakInfo "data breach notification" domain is no more.
  3. Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.
  4. Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?
  5. Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.
  6. The agency changed its policy to provide more timely and actionable information to state and local election officials in the case of a cybersecurity breach to election infrastructure.
  7. The flaws affect a key tool for managing its network platform and switches.
  8. iPhone users can now use Bluetooth to secure their Google accounts.
  9. A hellish mix of features shows the 5ss5c ransomware to be the son of Satan.
  10. Two proof-of-concept exploits were publicly released for the major Microsoft crypto-spoofing vulnerability.

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form