Threatpost (@threatpost) 's Twitter Profile
Threatpost

@threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

ID: 18789893

linkhttp://www.threatpost.com calendar_today09-01-2009 03:02:19

22,22K Tweet

214,214K Followers

5,5K Following

Threatpost (@threatpost) 's Twitter Profile Photo

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services. threatpost.com/magecart-resta…

Threatpost (@threatpost) 's Twitter Profile Photo

Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, #DDoS and RDP. threatpost.com/hackers-cyber-…

Threatpost (@threatpost) 's Twitter Profile Photo

The CISA has seen a resurgence of the #malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities. threatpost.com/zeppelin-ranso…

Threatpost (@threatpost) 's Twitter Profile Photo

Twitter is blasted for #security and #privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. threatpost.com/twitter-whistl…

Threatpost (@threatpost) 's Twitter Profile Photo

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack. threatpost.com/google-patches…

Threatpost (@threatpost) 's Twitter Profile Photo

Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites. threatpost.com/facebook-ios-t…

Threatpost (@threatpost) 's Twitter Profile Photo

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. threatpost.com/cybercriminals…

Threatpost (@threatpost) 's Twitter Profile Photo

Instances of #phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior. threatpost.com/popular-bait-i…

Threatpost (@threatpost) 's Twitter Profile Photo

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. threatpost.com/iphone-users-u…

Threatpost (@threatpost) 's Twitter Profile Photo

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational data destruction. threatpost.com/risks-okta-sso…

Threatpost (@threatpost) 's Twitter Profile Photo

Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites. threatpost.com/facebook-ios-t…

Threatpost (@threatpost) 's Twitter Profile Photo

Lockbit is by far this summer’s most prolific #ransomware group, trailed by two offshoots of the Conti group. threatpost.com/ransomware-att…

Threatpost (@threatpost) 's Twitter Profile Photo

Over 130 companies tangled in sprawling #phishing campaign that spoofed a multi-factor authentication system. threatpost.com/0ktapus-victim…

Threatpost (@threatpost) 's Twitter Profile Photo

Fake #travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. threatpost.com/reservation-li…

Threatpost (@threatpost) 's Twitter Profile Photo

The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data. threatpost.com/water-supplier…

Threatpost (@threatpost) 's Twitter Profile Photo

Attackers are spoofing the widely used #cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds. threatpost.com/phishers-2fa-c…

Threatpost (@threatpost) 's Twitter Profile Photo

Twitter is blasted for #security and #privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk. threatpost.com/twitter-whistl…

Threatpost (@threatpost) 's Twitter Profile Photo

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. threatpost.com/watering-hole-…

Threatpost (@threatpost) 's Twitter Profile Photo

2.5 million people were affected, in a breach that could spell more trouble down the line. threatpost.com/student-loan-b…

Threatpost (@threatpost) 's Twitter Profile Photo

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. threatpost.com/cybercriminals…