North Korea’s Hidden Cobra Strikes U.S. Targets with HOPLIGHT
The custom malware is a spy tool and can also disrupt processes at U.S. assets. Go to Source
The custom malware is a spy tool and can also disrupt processes at U.S. assets. Go to Source
Yet another WordPress plugin, Yellow Pencil Visual Theme Customizer, is being exploited in the wild after two software vulnerabilities were discovered. Go to Source
Convincing phishing pages and millions of suspicious apps are plaguing tax season. Go to Source
A vulnerability in the Yuzo Related Posts WordPress plugin, used by 60,000 websites, is being exploited in the wild. Go to Source
At SAS 2019, Recorded Future CTO discusses a new kind of high-profile influence campaign spotted using a new technique: Old news. Go to Source
Amazon is under fire for its privacy policies after a Bloomberg report revealed that the company hires auditors to listen to Echo recordings. Go to Source
A high-severity flaw in the Verizon Fios Quantum Gateway, used in millions of U.S. homes, could allow for command injection. Go to Source
At the Security Analyst Summit, Threatpost editor Tara Seals catches up with Joe FitzPatrick, researcher with Securing Hardware, to discuss supply chain threats. Go to Source
Yahoo is taking a second stab at settling a massive lawsuit regarding the data breaches that the Internet company faced between 2013 and 2016. Go to Source
In only the second known attack of the Russia-linked malware, which shut down an oil refinery in 2017, another Mideast target has been hit. Go to Source