Sponsor of the Day:
Jerkmate
https://threatpost.com/zero-click-apple-zero-day-pegasus-spy-attack/162515/
Zero-Click Apple Zero-Day Uncovered in Pegasus Spy Attack | Threatpost
Dec 21, 2020 - The phones of 36 journalists were infected by four APTs, possibly linked to Saudi Arabia or the UAE.
apple dayattack threatpostzerouncoveredpegasus
https://threatpost.com/attackers-porn-malsmoke-zloader-attack/161277/
Attackers Target Porn Site Goers in ‘Malsmoke’ Zloader Attack | Threatpost
Nov 17, 2020 - A fake Java update found on various porn sites actually downloads the well-known Zloader malware.
attackers targetporn sitegoersthreatpost
https://threatpost.com/water-supplier-hit-clop-ransomware/180422/
U.K. Water Supplier Hit with Clop Ransomware Attack | Threatpost
Aug 16, 2022 - The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
ransomware attack threatpostuwaterhitclop
https://threatpost.com/ucsf-pays-1-14m-after-netwalker-ransomware-attack/157015/
UCSF Pays $1.14M After NetWalker Ransomware Attack | Threatpost
Jun 30, 2020 - UCSF has paid more than $1 million after a ransomware attack encrypted data related to “important” academic research on several servers.
ransomware attack threatpostpays 1ucsf14mnetwalker
https://threatpost.com/a-guide-to-surviving-a-ransomware-attack/180110/
A Guide to Surviving a Ransomware Attack | Threatpost
Jun 30, 2022 - Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our...
ransomware attack threatpostguidesurviving
https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/
Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack | Threatpost
Oct 19, 2020 - Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours.
ryuk ransomwaregang useslightning fastattack threatpostzerologon
https://threatpost.com/19k-orange-livebox-modems-open-to-attack/140376/
19K Orange Livebox Modems Open to Attack | Threatpost
Dec 26, 2018 - A simple flaw allows attackers to derive WiFi credentials with little effort.
attack threatpost19korangeliveboxmodems
https://threatpost.com/covid-19-clinical-trials-ransomware/159877/
COVID-19 Clinical Trials Slowed After Ransomware Attack | Threatpost
Oct 7, 2020 - The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the...
ransomware attack threatpostcovid 19clinical trialsslowed
https://threatpost.com/saml-post-intrusion-attack-mirrors-golden-ticket/128993/
SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’ | Threatpost
Nov 28, 2017 - A proof-of-concept attack demonstrates how adversaries can abuse the Security Assertion Markup Language framework to go unnoticed and assume multiple user...
samlpostintrusionattackmirrors
https://threatpost.com/journalists-target-apts/180224/
Journalists Emerge as Favored Attack Target for APTs | Threatpost
Jul 14, 2022 - Since 2021, various state-aligned threat groups have turned up their targeting of journalists to siphon data and credentials and also track them.
journalistsemergefavoredattacktarget
https://threatpost.com/ryuk-earnings-trickbot/140823/
Ryuk Hauls in $3.7M in ‘Earnings,’ Adds TrickBot to the Attack Mix | Threatpost
Jan 14, 2019 - The malware’s operator, Grim Spider, could be affiliated with Russian cybercrime rings, according to some — others say there’s no concrete evidence.
3 7mryukhaulsaddstrickbot
https://threatpost.com/sophisticated-android-spyware-google-play/155202/
Sophisticated Android Spyware Attack Spreads via Google Play | Threatpost
May 1, 2020 - The PhantomLance espionage campaign is targeting specific victims, mainly in Southeast Asia — and could be the work of the OceanLotus APT.
android spywarevia googlesophisticatedattackspreads
https://threatpost.com/iphones-attack-turned-off/179641/
iPhones Vulnerable to Attack Even When Turned Off | Threatpost
May 17, 2022 - Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
iphonesvulnerableattackeventurned
https://threatpost.com/credential-stuffing-attack-ripe-ncc/164109/
Credential-Stuffing Attack Targets Regional Internet Registry | Threatpost
Feb 19, 2021 - RIPE NCC, the regional Internet registry for Europe, West Asia, and the former Soviet Union, said attackers attempted a credential-stuffing attack against its...
regional internet registrycredential stuffingattack targetsthreatpost
https://threatpost.com/top-3-attack-trends-in-api-security-podcast/179064/
Top 3 Attack Trends in API Security – Podcast | Threatpost
top 3attack trendsapi securitypodcast threatpost
https://threatpost.com/firewall-bug-under-active-attack-cisa-warning/180467/
Firewall Bug Under Active Attack Triggers CISA Warning | Threatpost
Aug 23, 2022 - CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
active attackfirewallbugtriggerscisa
https://threatpost.com/criminals-expand-attack-radius/179832/
Cybercriminals Expand Attack Radius and Ransomware Pain Points | Threatpost
Jun 2, 2022 - Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of “triple...
pain pointscybercriminalsexpandattackradius