Archives: May 2018
You are here: Home \ 2018 \ May \ Page 9
A rapidly swelling botnet of Twitter accounts advertising “adult dating”-themed scam websites has at least 80,000 nodes to date.
A backdoor could be exploited to allow an attacker to manipulate the implants and cause heart problems and even death,
A glitch caused Twitter passwords to be stored in plain text on an internal log.
The malware targets Windows servers with a cornucopia of well-known exploits, all within a single executable — including the EternalBlue NSA hacking tool.
Florida-based phone maker BLU is facing an FTC complaint over allegations it shared detailed personal user data with a third-party firm that included full text messages, call logs and contact lists.
Threatpost talks to Christie Terrill of Bishop Fox about the pros and cons of using bug bounty programs versus penetration testing for companies.
Bad actors are leveraging the critical Drupal vulnerability to install cryptomining malware on servers and browsers,
Attackers can leverage the flaw by convincing users to open a file purported to be a recording of a past WebEx event.
Secure-messaging firm Signal was told by Amazon not to use its AWS servers for domain-fronting, a technique used to enable communications in countries such as Egypt, Oman, Qatar and UAE where the service is banned.
These small specialty shops make rewards-point abuse more accessible to fraudsters by offering credentials for direct account access.