4 hours 5 minutes ago
Researchers wonder if a recent "amateur spam" campaign by the once-prevalant malware distribution botnet is a sign of trojans looking to other infection paths.
6 hours 10 minutes ago
State senators have issued proposals they say would encourage municipalities to upgrade their cyber-postures.
9 hours 46 minutes ago
The new U.K. law mandates that manufacturers apply several security controls to their connected devices.
3 days 2 hours ago
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.
3 days 4 hours ago
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.
3 days 6 hours ago
The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.
3 days 9 hours ago
The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems.
4 days 4 hours ago
The Feds have warned on six vulnerabilities in GE medical equipment that could affect patient monitor alarms and more.
4 days 4 hours ago
The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.
4 days 5 hours ago
The malware uses thousands of partner websites to spread malvertising code.
4 days 8 hours ago
The critical flaw exists in Cisco's administrative management tool, used with network security solutions like firewalls.
4 days 12 hours ago
New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties.
5 days ago
The competition targets the systems that run critical infrastructure and more.
5 days 1 hour ago
A newly discovered threat actor named Vivin is raking in Monero from cryptomining malware, showing that this type of attack isn't going away anytime soon.
5 days 8 hours ago
The newest version of the sLoad malware dropper comes equipped with infection tracking capabilities and an anti-analysis trick.
5 days 9 hours ago
The trove of information is potentially a scammer's bonanza.
5 days 11 hours ago
Palo Alto Networks’ Unit 42 researchers observed a variant of the wormlike botnet that adds scanner technology to brute-force Web authentication.
5 days 13 hours ago
More than half of security experts think that the good outweighs the bad when it comes to proof-of-concept exploits, according to a recent Threatpost poll.
6 days 1 hour ago
A sophisticated malware-as-a-service phishing kit includes full customer service and anti-detection technologies.
6 days 6 hours ago
Citrix has issued the first of several updates fixing a critical vulnerability in various versions of its Citrix Application Delivery Controller (ADC) and Citrix Gateway products.
3 hours 28 minutes ago
The First Stop For Security News
Subscribe to Threat Post feed