All posts in Security News

Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings. With many approaches to honing your skills and broadening your knowledge, next month’s virtual Black Hat USA events can help enhance your skills — there will be a broad spectrum of in-depth cybersecurity Briefings and Trainings. If you’re . . . Read more

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves. The discovery of the Ripple20 vulnerabilities, affecting hundreds of millions of Internet of Things (IoT) devices, is the latest reminder of the dangers that third-party bugs pose to connected devices. Although the . . . Read more
16 Jul, 2020
amazon, armorblox, bloom flicka, Credential Theft, DMARC, domain spoofing, email campaign, email security, information stealing, order notices, package delivery, Phishing, security bypass, Security News, social engineering, Vishing, voice phishing, Web Security
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

More than half are holding off upgrading altogether, and 12% said they would upgrade to a less expensive model, Ting Mobile found. Image: iStockphoto/Sitthiphong More about Innovation The majority of smartphone users (69%) who initially planned on upgrading devices this year have changed their plans, a Ting report found. The . . . Read more

An O’Reilly study polled engineers about their experience with microservices. Image: iStockphoto/Jirsak In a new survey from O’Reilly on how, why, and in which scenarios people are using microservices, researchers found that many organizations are adopting and experiencing success with it. The Microservices Adoption in 2020 study was written by Mike . . . Read more

Campaigns exploiting COVID-19 remained popular last quarter, but cybercriminals also relied on tried and true subjects, says KnowBe4. Image: Getty Images/iStockphoto Email phishing attacks work by spoofing or referencing well-known topics that the attackers hope will arouse fear or concern or interest on the part of the recipients. These types . . . Read more

The loophole gave cybercriminals an opening through specialized Zoom URL links. IMAGE: iStock/fizkes Massively popular video conferencing platform Zoom has worked with cybersecurity company Check Point to resolve a glaring security issue centered on vanity URLs. More about cybersecurity When told about the exploit by Check Point researchers, officials with . . . Read more
16 Jul, 2020
0day, CryptBB, cybercriminals, Dark Web, Digital Shadows, hacker forum, Hackers, hackers for hire, Hacking, Hacks, KickAss, Research, Security News, the report, threat actors, Torum, Web Security
0

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

If you ask Alex, he won’t admit being old-fashioned. He has been working in the IT industry for a while now and accepts that security is important for the business’s health. But reluctant to take security as the business enabler. In today’s environment, moving to digitization is a critical step . . . Read more

The United States Department of Justice yesterday sentenced a 22-year-old Washington-based hacker to 13 months in federal prison for his role in creating botnet malware, infecting a large number of systems with it, and then abusing those systems to carry out large scale distributed denial-of-service (DDoS) attacks against various online . . . Read more