Category: threatpost

Magecart Cyberattack Targets NutriBullet Website

Researchers warn that a Magecart group has set up skimmers on the blender manufacturer’s website, in hopes of stealing customer payment-card data.   Advertise on IT Security News. Read the complete article: Magecart Cyberattack Targets NutriBullet Website

This Stalkerware Delivers Extra-Creepy Features

Stalkerware called Monitor Minor gives users the ability to creep on a target’s missives swapped via Instagram, Skype and Snapchat.   Advertise on IT Security News. Read the complete article: This Stalkerware Delivers Extra-Creepy Features

Activities of a Nigerian Cybercriminal Uncovered

Rise and fall of a Nigerian cybercriminal called ‘Dton,’ who made hundreds of thousands of dollars in a 7-year campaign, outlined in new report.   Advertise on IT Security News. Read the complete article: Activities of a Nigerian Cybercriminal Uncovered

Coronavirus-Themed APT Attack Spreads Malware

The APT group was spotted sending spear-phishing emails that purport to detail information about coronavirus – but they actually infect victims with a custom RAT.   Advertise on IT Security News. Read the complete article: Coronavirus-Themed APT Attack Spreads Malware

ACLU Sues Over U.S. Airport Facial-Recognition Technology

Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.   Advertise on IT Security News. Read the complete article: ACLU Sues Over U.S. Airport Facial-Recognition Technology

Researchers Warn of Novel PXJ Ransomware Strain

While PXJ performs typical ransomware functions, it does not appear to share the same underlying code with most known ransomware families.   Advertise on IT Security News. Read the complete article: Researchers Warn of Novel PXJ Ransomware Strain

Phishing Attack Skirts Detection With YouTube

Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.   Advertise on IT Security News. Read the complete article: Phishing Attack Skirts Detection With YouTube

Necurs Botnet in Crosshairs of Global Takedown Offensive

The tech giant will take control of the U.S.-based infrastructure used by the criminals behind the world’s most prolific botnet used to distribute malware and infect victim computers.   Advertise on IT Security News. Read the complete article: Necurs Botnet…

Critical Bugs in Rockwell, Johnson Controls ICS Gear

Bugs affecting programmable logic controllers (PLC) and physical access-control systems for facilities are rated 9.8 in severity.   Advertise on IT Security News. Read the complete article: Critical Bugs in Rockwell, Johnson Controls ICS Gear

Microsoft Patches 26 Critical Bugs in Big March Update

March security updates include 115 CVEs patching everything from Windows, Office and Microsoft’s new Chromium-based Edge web browser.   Advertise on IT Security News. Read the complete article: Microsoft Patches 26 Critical Bugs in Big March Update

High-Severity Flaws Plague Intel Graphics Drivers

Intel patched six high-severity flaws in its graphics drivers, as well as other vulnerabilities in its NUC firmware, and a load value injection vulnerability that could allow attackers to steal sensitive data.   Advertise on IT Security News. Read the…

Critical Zoho Zero-Day Flaw Disclosed

A Zoho zero day vulnerability and proof of concept (PoC) exploit code was disclosed on Twitter.   Advertise on IT Security News. Read the complete article: Critical Zoho Zero-Day Flaw Disclosed

High-Severity Cisco Webex Flaws Fixed

The high-severity flaws, existing in Webex Player and Webex Network Recording Player, can allow arbitrary code execution.   Advertise on IT Security News. Read the complete article: High-Severity Cisco Webex Flaws Fixed

Trump, Sanders Are the Top Brands for Cybercriminals

An analysis of spam subject lines and malicious domains shows that attackers have been betting on Trump and Sanders to snag public interest.   Advertise on IT Security News. Read the complete article: Trump, Sanders Are the Top Brands for…

Loyalty Cards Targeted in Tesco Clubcard Attack

Around 600,000 of the supermarket’s 12 million loyalty program members have been warned about a cyberattack.   Advertise on IT Security News. Read the complete article: Loyalty Cards Targeted in Tesco Clubcard Attack

Cobalt Ulster Strikes Again With New ForeLord Malware

Threatpost talks to Alex Tilley, senior security researcher with Dell SecureWorks’ Counter Threat Unit Research Team, about a recently discovered campaign linked to an Iranian APT.   Advertise on IT Security News. Read the complete article: Cobalt Ulster Strikes Again…

Let’s Encrypt to Revoke Millions of TLS Certs

On Wednesday millions of Transport Layer Security certificates will be revoked because of a Certificate Authority Authorization bug.   Advertise on IT Security News. Read the complete article: Let’s Encrypt to Revoke Millions of TLS Certs

Have I Been Pwned No Longer For Sale

Troy Hunt said the popular HIBP will continue to be run as an independent service.   Advertise on IT Security News. Read the complete article: Have I Been Pwned No Longer For Sale

Walgreens Mobile App Leaks Prescription Data

A security error in the Walgreens mobile app may have leaked customers’ full names, prescriptions and shipping addresses.   Advertise on IT Security News. Read the complete article: Walgreens Mobile App Leaks Prescription Data

Forrester: Keeping Smart Cities Safe From Hacks

As cities grow more connected, municipal operators must deal with new risks like ransomware, IoT hacks and more.   Advertise on IT Security News. Read the complete article: Forrester: Keeping Smart Cities Safe From Hacks

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

CEO Mary T. Barra addressed the high stakes in rolling out self-driving cars and biometric-enhanced vehicles, where one cyber-event could derail plans for emerging automotive technologies.   Advertise on IT Security News. Read the complete article: RSAC 2020: GM’s Transportation…

IoT Insecurity: When Your Vacuum Turns on You

From vacuum cleaners to baby monitors, the IoT landscape continues to be plagued by concerning security issues that lead to privacy threats.   Advertise on IT Security News. Read the complete article: IoT Insecurity: When Your Vacuum Turns on You

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.   Advertise on IT Security News. Read the complete article: Billions of Devices Open to Wi-Fi…

RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

A popular baby monitor has been found riddled with vulnerabilities that give attackers full access to personal information and sensitive video footage.   Advertise on IT Security News. Read the complete article: RSAC 2020: Smart Baby Monitor Vulnerable to Remote…

Hackers Cashing In On Healthcare Industry Security Weaknesses

Between ransomware attacks on healthcare devices, malware-laced “medical” apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.   Advertise on IT Security News. Read the complete article: Hackers Cashing In On Healthcare…

Unpatched Security Flaws Open Connected Vacuum to Takeover

A connected, robotic vacuum cleaner has serious vulnerabilities that could allow remote hackers to view its video footage and launch denial of service attacks.   Advertise on IT Security News. Read the complete article: Unpatched Security Flaws Open Connected Vacuum…

Iranian APT Targets Govs With New Malware

A new campaign is targeting governments with the ForeLord malware, which steals credentials.   Advertise on IT Security News. Read the complete article: Iranian APT Targets Govs With New Malware

Stalkerware Attacks Increased 50 Percent Last Year, Report

Research puts the emerging mobile threat—which monitors the whereabouts and device activity of devices users as well as collects personal data—into clearer focus.   Advertise on IT Security News. Read the complete article: Stalkerware Attacks Increased 50 Percent Last Year,…

Google Patches Chrome Browser Zero-Day Bug, Under Attack

Google patches zero-day bug tied to memory corruptions found inside the Chrome browser’s open-source JavaScript and Web Assembly engine, called V8.   Advertise on IT Security News. Read the complete article: Google Patches Chrome Browser Zero-Day Bug, Under Attack

Free Download: The Ultimate Security Pros’ Checklist

The Ultimate Security Pros’ Checklist fully maps the core duties of common security positions, from the core technical security aspect to team management and executive reporting.   Advertise on IT Security News. Read the complete article: Free Download: The Ultimate…

Haken Malware Family Infests Google Play Store

Eight apps – mostly camera utilities and children’s games – were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services.   Advertise on IT Security News. Read the complete article: Haken Malware…

BlueKeep Flaw Plagues Outdated Connected Medical Devices

More than 55 percent of medical imaging devices – including MRIs, XRays and ultrasound machines – are powered by outdated Windows versions, researchers warn.   Advertise on IT Security News. Read the complete article: BlueKeep Flaw Plagues Outdated Connected Medical…

Latest Tax Scams Target Apps and Tax-Prep Websites

Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victims’ systems.   Advertise on IT Security News. Read the complete article: Latest Tax Scams Target Apps…

Ring Mandates 2FA After Rash of Hacks

Ring outlined new security and data privacy measures, Tuesday, following backlash of the connected doorbell in the past year.   Advertise on IT Security News. Read the complete article: Ring Mandates 2FA After Rash of Hacks

Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs

A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.   Advertise on IT Security News. Read the complete article: Lenovo, HP, Dell Peripherals Face…