Manchester United: IT Systems Disrupted in Cyberattack

The popular U.K. soccer club confirmed an attack but said personal fan data remains secure. Source: Threadpost

Joe Biden Campaign Subdomain Down After Hacktivist Defacement

A Turkish hacktivist defaced a subdomain of the president-elect's campaign website. Source: Threadpost

Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns

Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns. Source: Threadpost

VMware Fixes Critical Flaw in ESXi Hypervisor

The critical and important-severity flaws were found by a team at the China-based Tiunfu Cup hacking challenge. Source: Threadpost

Good Heavens! 10M Impacted in Pray.com Data Exposure

The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists. Source: Threadpost

New Grelos Skimmer Variants Siphon Credit Card Data

Domains related to the new variant of the Grelos web skimmer have compromised dozens of websites so far. Source: Threadpost

Facebook Messenger Bug Allows Spying on Android Users

The company patched a vulnerability that could connected video and audio calls without the knowledge of the person receiving them. Source: Threadpost

IT threat evolution Q3 2020. Non-mobile statistics

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, in Q3: Kaspersky solutions blocked 1,416,295,227 attacks launched...

IT threat evolution Q3 2020 Mobile statistics

The statistics presented here draw on detection verdicts returned by Kaspersky products and received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, the third quarter saw: 1,189...

IT threat evolution Q3 2020

Targeted attacks MATA: Lazarus’s multi-platform targeted malware framework The more sophisticated threat actors are continually developing their TTPs (Tactics, Techniques and Procedures) and the toolsets they use to compromise the systems of their...
- Advertisement -

APLICATIONS