Active Campaign Exploits Critical Apache Struts 2 Flaw in the Wild
It was only a matter of time before attacks were seen in the wild, and now it’s happened. A known threat actor has mounted a Read More
It was only a matter of time before attacks were seen in the wild, and now it’s happened. A known threat actor has mounted a Read More
A whopping 7,339 (and counting) individual e-commerce sites have been infested with the MagentoCore.net payment-card skimmer in the last six months, making the malicious script Read More
Cyber-threats that come from within an organization – carried out by employees, former employees, contractors or business associates – represent a very real and growing Read More
A vulnerability in a Facebook server that could have led to information disclosure and command execution has been patched by the social network. At issue Read More
A small malware campaign is leveraging spyware called BusyGasper, which is highly effective at collecting data on Android phones and exfiltrating it. The malware is Read More
Several mobile software developer kits (SDKs) can capture sensitive user data when a mobile app crashes, exposing private data to an outside third party. Researchers Read More
Two previously undocumented, critical vulnerabilities in widely deployed medical devices have sparked patient-safety and data-privacy concerns. Flaws in the Qualcomm Life Capsule Datacaptor Terminal Server Read More
Threatpost talks to a Google Cloud expert about the top issues users face when securing data in the cloud. Read More
While the rest of the U.S. tech industry is taking steps to assuage consumer concerns over privacy and data-harvesting, Yahoo is selling off the ability Read More
An “API-breaking” vulnerability has been uncovered that potentially exposes Android device systems data to rogue apps — information that could be very useful to bad Read More