Microsoft Tackles Election Security with Bug Bounties Researchers can earn up to $15,000, depending on the severity of the bug found.

Execs Could Face Jail Time For Privacy Violations The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.

Major Airport Malware Attack Shines a Light on OT Security A cryptomining infection spread to half of the workstations at a major international airport.

Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise A patch is currently under revision but has not yet been incorporated into the Linux kernel.

Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent At what point will infiltrating companies via the "insider threat model" become less costly and difficult than using malware? Threatpost discusses with a SolarWind expert.

Zappos Offers Users 10% Discount in 2012 Breach Settlement Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.

Phorpiex Botnet Shifts Gears From Ransomware to Sextortion A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims.

Hacking Back? BriansClub Dark Web Attack a Boon for Banks The theft of 26 million card records from an underground site offers valuable intel for banks.

Trump Campaign Website Left Open to Email Server Hijack A misconfigured website development tool exposed hundreds of email servers to takeover, including President Donald Trump’s official campaign website.

Cisco Aironet Access Points Plagued By Critical, High-Severity Flaws Cisco has issued patches for critical and high-severity vulnerabilities in its Aironet access point devices.

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit.

10 Steps for Ransomware Protection Here are things you can do right now to shore up your defenses and help your recovery when you get hit.

Silent Librarian Retools Phishing Emails to Hook Student Credentials Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.

.WAVs Hide Malware in Their Depths in Innovative Campaign Three different loaders and two payloads are hiding in audio files.

Docker Containers Riddled with Graboid Crypto-Worm A worm with a randomized propagation method is spreading via the popular container technology.

Podcast: Departing Employees Could Mean Departing Data Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.

New Presentation Template: Incident Response Reporting for Management For many security decision-makers, the real challenge is communicating the ongoing IR process to their management.

Cybercrime Tool Prices Bump Up in Dark Web Markets A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.

Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector, Report A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.

Unencrypted Mobile Traffic on Tor Network Leaks PII Researchers create digital dossiers of mobile users scraped from Tor network traffic.

Show more

Lokale Instanz der MHC SoftWare GmbH