Twitter | Search | |
Threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
18,822
Tweets
6,435
Following
177,512
Followers
Tweets
Threatpost 2h
Some configurations of the Radeon graphics card have a remote execution bug that could allow an attacker to take control of a targeted system.
Reply Retweet Like
Threatpost 4h
A confusing Calendar configuration setting has led to hundreds of calendars (including a employee's calendar) being inadvertently open to the public - potentially exposing company internal secrets, memos and more.
Reply Retweet Like
Threatpost 7h
patched a bug that could potentially allow malicious websites to access a web user’s credentials from a previously visited site. (h/t )
Reply Retweet Like
Threatpost 23h
The entire population of has been impacted by an open database on an unsecured server. Exposed data includes: -Full name -Date and place of birth -Home address -Cell phone numbers/emails -Taxpayer IDs -Marital status (Via )
Reply Retweet Like
Threatpost Sep 16
Independent researchers found 125 remotely exploitable CVEs across 13 different models, including ones from ASUS and .
Reply Retweet Like
Threatpost Sep 16
The U.S. slapped sanctions on three well-known North Korean hacker groups – including the group tied to the 2017 attacks and the 2014 on Sony Pictures Entertainment.
Reply Retweet Like
Threatpost Sep 16
A new threat actor is using impersonation to purchase digital certificates, and then using them to spread , according to .
Reply Retweet Like
Threatpost Sep 16
A just-patched stored cross-site scripting vulnerability in allowed remote code-execution.
Reply Retweet Like
Threatpost Sep 15
How are black hats using to flip the script on AI solutions? Learn more at our upcoming webinar, where a panel of experts will discuss the pros and cons of AI. Register:
Reply Retweet Like
Threatpost Sep 15
A new campaign that injects victims with the Astaroth spy trojan uses and YouTube profiles to cover its tracks.
Reply Retweet Like
Threatpost Sep 15
A newly-uncovered sophisticated North Korean campaign is targeting U.S. entities with legitimate documents - that the targets were likely expecting - but which have been booby-trapped.
Reply Retweet Like
Threatpost Sep 14
What are the current types of -enabled tools available to customers and how do they differ? We'll discuss in our upcoming webinar. Register today:
Reply Retweet Like
Threatpost Sep 14
A backdoor opened more than 1 million Imperial Dabman radios to hijack. We discuss in this week's news wrap.
Reply Retweet Like
Threatpost Sep 14
Researchers say that the that is vulnerable to the "SimJacker" attack is used by operators in at least 30 countries - whose population adds up to over a billion people.
Reply Retweet Like
Threatpost Sep 13
An lock screen bypass could enable an attacker to access victims’ address books - including their contacts’ email addresses and phone numbers.
Reply Retweet Like
Threatpost Sep 13
and profiles are at the heart of an ongoing phishing campaign spreading the Astaroth trojan.
Reply Retweet Like
Threatpost Sep 13
: Good or bad for the future of ? We'll discuss in our upcoming webinar. Register today to learn more:
Reply Retweet Like
Threatpost Sep 13
An ongoing sophisticated campaign is sending spear-phishing to U.S.-based entities, which contain trojanized documents about North Korean economic sanctions and nuclear submarine programs.
Reply Retweet Like
Threatpost Sep 13
Threatpost editors break down the biggest stories of this week, including: -1B users being at risk from a SIM card attack -1M Imperial Dabman radios vulnerable to a Telnet backdoor -Wikipedia being crippled by weekend DDoS attacks
Reply Retweet Like
Threatpost Sep 13
Advanced attacks, including impersonation attacks and CEO , showed a steady increase in Q1 of 2019 and are projected to rise through Q2.
Reply Retweet Like