Robuta

Sponsor of the Day: Jerkmate
https://threatpost.com/zero-click-apple-zero-day-pegasus-spy-attack/162515/ Zero-Click Apple Zero-Day Uncovered in Pegasus Spy Attack | Threatpost Dec 21, 2020 - The phones of 36 journalists were infected by four APTs, possibly linked to Saudi Arabia or the UAE. apple dayattack threatpostzerouncoveredpegasus https://threatpost.com/attackers-porn-malsmoke-zloader-attack/161277/ Attackers Target Porn Site Goers in ‘Malsmoke’ Zloader Attack | Threatpost Nov 17, 2020 - A fake Java update found on various porn sites actually downloads the well-known Zloader malware. attackers targetporn sitegoersthreatpost https://threatpost.com/water-supplier-hit-clop-ransomware/180422/ U.K. Water Supplier Hit with Clop Ransomware Attack | Threatpost Aug 16, 2022 - The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data. ransomware attack threatpostuwaterhitclop https://threatpost.com/ucsf-pays-1-14m-after-netwalker-ransomware-attack/157015/ UCSF Pays $1.14M After NetWalker Ransomware Attack | Threatpost Jun 30, 2020 - UCSF has paid more than $1 million after a ransomware attack encrypted data related to “important” academic research on several servers. ransomware attack threatpostpays 1ucsf14mnetwalker https://threatpost.com/a-guide-to-surviving-a-ransomware-attack/180110/ A Guide to Surviving a Ransomware Attack | Threatpost Jun 30, 2022 - Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our... ransomware attack threatpostguidesurviving https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/ Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack | Threatpost Oct 19, 2020 - Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours. ryuk ransomwaregang useslightning fastattack threatpostzerologon https://threatpost.com/19k-orange-livebox-modems-open-to-attack/140376/ 19K Orange Livebox Modems Open to Attack | Threatpost Dec 26, 2018 - A simple flaw allows attackers to derive WiFi credentials with little effort. attack threatpost19korangeliveboxmodems https://threatpost.com/covid-19-clinical-trials-ransomware/159877/ COVID-19 Clinical Trials Slowed After Ransomware Attack | Threatpost Oct 7, 2020 - The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the... ransomware attack threatpostcovid 19clinical trialsslowed https://threatpost.com/saml-post-intrusion-attack-mirrors-golden-ticket/128993/ SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’ | Threatpost Nov 28, 2017 - A proof-of-concept attack demonstrates how adversaries can abuse the Security Assertion Markup Language framework to go unnoticed and assume multiple user... samlpostintrusionattackmirrors https://threatpost.com/journalists-target-apts/180224/ Journalists Emerge as Favored Attack Target for APTs | Threatpost Jul 14, 2022 - Since 2021, various state-aligned threat groups have turned up their targeting of journalists to siphon data and credentials and also track them. journalistsemergefavoredattacktarget https://threatpost.com/ryuk-earnings-trickbot/140823/ Ryuk Hauls in $3.7M in ‘Earnings,’ Adds TrickBot to the Attack Mix | Threatpost Jan 14, 2019 - The malware’s operator, Grim Spider, could be affiliated with Russian cybercrime rings, according to some — others say there’s no concrete evidence. 3 7mryukhaulsaddstrickbot https://threatpost.com/sophisticated-android-spyware-google-play/155202/ Sophisticated Android Spyware Attack Spreads via Google Play | Threatpost May 1, 2020 - The PhantomLance espionage campaign is targeting specific victims, mainly in Southeast Asia — and could be the work of the OceanLotus APT. android spywarevia googlesophisticatedattackspreads https://threatpost.com/iphones-attack-turned-off/179641/ iPhones Vulnerable to Attack Even When Turned Off | Threatpost May 17, 2022 - Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware. iphonesvulnerableattackeventurned https://threatpost.com/credential-stuffing-attack-ripe-ncc/164109/ Credential-Stuffing Attack Targets Regional Internet Registry | Threatpost Feb 19, 2021 - RIPE NCC, the regional Internet registry for Europe, West Asia, and the former Soviet Union, said attackers attempted a credential-stuffing attack against its... regional internet registrycredential stuffingattack targetsthreatpost https://threatpost.com/top-3-attack-trends-in-api-security-podcast/179064/ Top 3 Attack Trends in API Security – Podcast | Threatpost top 3attack trendsapi securitypodcast threatpost https://threatpost.com/firewall-bug-under-active-attack-cisa-warning/180467/ Firewall Bug Under Active Attack Triggers CISA Warning | Threatpost Aug 23, 2022 - CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. active attackfirewallbugtriggerscisa https://threatpost.com/criminals-expand-attack-radius/179832/ Cybercriminals Expand Attack Radius and Ransomware Pain Points | Threatpost Jun 2, 2022 - Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of “triple... pain pointscybercriminalsexpandattackradius