ThreatList: 6-Year-Old Dorkbot Banking Malware Resurfaces as Big Risk
The banking malware called Dorkbot is back. Samples of the 6-year-old malware are now ranked the 2nd most significant banking malware headache in 2018 so Read More
The banking malware called Dorkbot is back. Samples of the 6-year-old malware are now ranked the 2nd most significant banking malware headache in 2018 so Read More
The city of Atlanta is currently being targeted in a ransomware attack impacting several of its departments and crippling government websites that process payments and Read More
Facebook said in the coming weeks it will expand its bug bounty program in an attempt to crackdown on data misuse by third-party app developers. Read More
Google presented new security mitigations for its Chrome browser to prevent just recently discovered Spectre variants.The new security function, called website isolation, essentially isolates various Read More
The Bitcoin Baron, a self-proclaimed vigilante responsible for DDoS attacks on civic networks in Madison, Wisc., San Marcos, Texas, and other sites in 2015, has Read More
Intel presented hardware-based protections to its new chips to safeguard against the Spectre and Meltdown flaws that rocked the silicon market when the vulnerabilities were Read More
A zero-day vulnerability is being made use of in the wild in targeted attacks against Windows users in the Middle East, scientists alerted Thursday.The Flash Read More
Israeli Electric Authority Struck by ‘Serious Cyber Attack,’ Most Likely Ransomware< a href=https://threatpost.com/defense-contractor-northrop-grumman-hiring-offensive-cyber-ops-051812/76585/ title=”Permalink to Defense Contractor Northrop Grumman Hiring For Offensive Cyber Ops “rel=bookmark Read More
The popular home automation protocol Z-Wave, utilized by millions of IoT gadgets, is vulnerable to a downgrade attack that could allow a foe to take Read More
A critical vulnerability in the recording function of Cisco Systems’ WebEx conferencing platform has been uncovered, allowing for remote code execution. Attackers can use the flaw Read More