Microsoft Tackles Election Security with Bug Bounties Researchers can earn up to $15,000, depending on the severity of the bug found. threatpost.com/microsoft-elect

Execs Could Face Jail Time For Privacy Violations The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies. threatpost.com/execs-jail-time

Major Airport Malware Attack Shines a Light on OT Security A cryptomining infection spread to half of the workstations at a major international airport. threatpost.com/major-airport-m

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise A patch is currently under revision but has not yet been incorporated into the Linux kernel. threatpost.com/critical-linux-

Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent At what point will infiltrating companies via the "insider threat model" become less costly and difficult than using malware? Threatpost discusses with a SolarWind expert. threatpost.com/podcast-insider

Zappos Offers Users 10% Discount in 2012 Breach Settlement Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers. threatpost.com/zappos-offers-u

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims. threatpost.com/phorpiex-botnet

Hacking Back? BriansClub Dark Web Attack a Boon for Banks The theft of 26 million card records from an underground site offers valuable intel for banks. threatpost.com/hacking-back-br

Trump Campaign Website Left Open to Email Server Hijack A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trump’s official campaign website. threatpost.com/trump-campaign-

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices. threatpost.com/cisco-aironet-a

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit. threatpost.com/kubernetes-bugs

10 Steps for Ransomware Protection Here are things you can do right now to shore up your defenses and help your recovery when you get hit. threatpost.com/10-steps-ransom

Silent Librarian Retools Phishing Emails to Hook Student Credentials Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials. threatpost.com/silent-libraria

.WAVs Hide Malware in Their Depths in Innovative Campaign Three different loaders and two payloads are hiding in audio files. threatpost.com/wavs-hide-malwa

Docker Containers Riddled with Graboid Crypto-Worm A worm with a randomized propagation method is spreading via the popular container technology. threatpost.com/docker-containe

Podcast: Departing Employees Could Mean Departing Data Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today. threatpost.com/podcast-departi

New Presentation Template: Incident Response Reporting for Management For many security decision-makers, the real challenge is communicating the ongoing IR process to their management. threatpost.com/incident-respon

Cybercrime Tool Prices Bump Up in Dark Web Markets A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated. threatpost.com/cybercrime-tool

Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector, Report A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector. threatpost.com/galaxy-s10-fing

Unencrypted Mobile Traffic on Tor Network Leaks PII Researchers create digital dossiers of mobile users scraped from Tor network traffic. threatpost.com/unencrypted-mob

Show more
mhc.social

Lokale Instanz der MHC SoftWare GmbH