Threatpost News Wrap Podcast For Oct. 12
Threatpost’s editors discuss the top news of this week. Go to Source
Threatpost’s editors discuss the top news of this week. Go to Source
The official update from Microsoft only limits the vulnerability, according to 0Patch. Go to Source
Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence. Go to Source
The move comes a month before the November midterm elections – and at a time when all eyes are on Facebook to see how it protects against disinformation. Go to Source
Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks. Go to Source
Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot. Go to Source
Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging. Go to Source
GPlayed may be the new face of malware — flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone. Go to Source
A fake Adobe update actually updates victims’ Flash – but also installs malicious cryptomining malware. Go to Source
Most of the attacks originated in China. Go to Source