6 Questions Attackers Ask Before Choosing an Asset to Exploit

David “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding "hacker logic" can help prioritize defenses. Source: Threadpost

Japanese Aerospace Firm Kawasaki Warns of Data Breach

The Japanese aerospace manufacturer said that starting in June, overseas unauthorized access to its servers may have compromised customer data. Source: Threadpost

2020 Work-for-Home Shift: What We Learned

Threatpost explores 5 big takeaways from 2020 -- and what they mean for 2021. Source: Threadpost

Digital Footprint Intelligence Report

Introduction The Digital Footprint Intelligence Service announces the results of research on the digital footprints of governmental, financial and industrial organizations for countries in the Middle East region: Bahrain, Egypt, Iran, Iraq,...

Hackers Amp Up COVID-19 IP Theft Attacks

In-depth report looks at how COVID-19 research has become as a juicy new target for organized cybercrime. Source: Threadpost

Ransomware in 2020: A Banner Year for Extortion

From attacks on the UVM Health Network that delayed chemotherapy appointments, to ones on public schools that delayed students going back to the classroom, ransomware gangs disrupted organizations to inordinate levels...

Windows Zero-Day Still Circulating After Faulty Fix

The LPE bug could allow an attacker to install programs; view, change, or delete data; or create new accounts with full user rights. Source: Threadpost

Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack

The nation-state actor is looking to speed up vaccine development efforts in North Korea. Source: Threadpost

Third-Party APIs: How to Prevent Enumeration Attacks

Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it. Source: Threadpost

Hey Alexa, Who Am I Messaging?

Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info. Source: Threadpost
- Advertisement -

APLICATIONS

DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo

Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks. Source: Threadpost