Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats | Threatpost
In the era of the cloud, enterprises house sensitive corporate data outside of the traditional perimeter; employees can access this from any endpoint, including mobile devices, and Read More
Years-Long Phishing Campaign Targets Saudi Gov Agencies | Threatpost
An ongoing three-year-old phishing campaign has been targeting the credentials of Saudi Arabian government agencies — with a financially motivated actor the likely culprit. The Read More
Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project | Threatpost
A critical denial-of-service (DoS) vulnerability in Facebook’s open-source implementation of the transport layer security (TLS) 1.3 protocol could cause an infinite loop – thus disrupting Read More
WordPress Plugin Patched After Zero Day Discovered | Threatpost
A popular WordPress plugin is urging users to update as soon as possible after it patched a vulnerability that was being exploited in the wild. Read More
Mac-Focused Malvertising Campaign Abuses Google Firebase DBs | Threatpost
A malvertising group named VeryMal that targets Mac users has changed up its tactics, ditching steganography as its obfuscation technique. Instead, it’s using ad tags Read More
ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown | Threatpost
The average size of distributed denial of service (DDoS) attacks decreased significantly, dropping by 85 percent in the fourth quarter of 2018. Researchers with NexusGuard said in a Read More
Researcher Says NSA’s Ghidra Tool Can Be Used for RCE | Threatpost
Ghidra, a free, open-source software reverse-engineering tool that was released by the National Security Agency at RSA, has been found to be a potential conduit Read More
Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack | Threatpost
Norway-based Norsk Hydro announced on Tuesday morning it was victim to a ransomware attack, which forced the global aluminum producer to shut down or isolate Read More