‘Minecraft Mods’ Attack More Than 1 Million Android Devices

Fake Minecraft Modpacks on Google Play deliver millions of abusive ads and make normal phone use impossible. Source: Threadpost

Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues

Matt Lewis, with NCC Group, talks to Threatpost about a slew of security and privacy issues found in smart doorbells that are being sold on Amazon and eBay. Source: Threadpost

Baidu Apps in Google Play Leak Sensitive Data

Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls. Source: Threadpost

Blackrota Golang Backdoor Packs Heavy Obfuscation Punch

Blackrota is targeting a security bug in Docker, but is nearly impossible to reverse-analyze. Source: Threadpost

Tesla Hacked and Stolen Again Using Key Fob

Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes. Source: Threadpost

Lookalike domains and how to outfox them

Our colleagues already delved into how cybercriminals attack companies through compromised email addresses of employees, and how to protect against such attacks using SPF, DKIM and DMARC technologies. But despite the...

Critical VMware Zero-Day Bug Allows Command Injection; Patch Pending

VMware explained it has no patch for a critical escalation-of-privileges bug that impacts both Windows and Linux operating systems and its Workspace One. Source: Threadpost

GoDaddy Employees Tricked into Compromising Cryptocurrency Sites

‘Vishing’ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid. Source: Threadpost

TA416 APT Rebounds With New PlugX Malware Variant

The TA416 APT has returned in spear phishing attacks against a range of victims - from the Vatican to diplomats in Africa - with a new Golang version of its PlugX...

Spotify Users Hit with Rash of Account Takeovers

Users of the music streaming service were targeted by attackers using credential-stuffing approaches. Source: Threadpost
- Advertisement -

APLICATIONS

Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place. Source: Threadpost