How to Write a Cybersecurity Playbook During a Pandemic

IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on. Source: Threadpost

Transparent Tribe: Evolution analysis,part 2

Background + Key findings Transparent Tribe, also known as PROJECTM or MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. In the last four...

Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform

Researchers have unearthed more vulnerabilities in Microsoft’s IoT security solution. Source: Threadpost

Safari Bug Revealed After Apple Takes Nearly a Year to Patch

Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files. Source: Threadpost

Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages

The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals. Source: Threadpost

Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem

With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem...

Google Fixes High-Severity Chrome Browser Code Execution Bug

The high-severity flaw, which was patched in the latest version of Google's Chrome browser, could allow code execution. Source: Threadpost

Iran-Linked ‘Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports

The recent Dharma campaign by Iran-linked script kiddies shows that the ransomware is being spread not just by sophisticated, state-sponsored actors anymore. Source: Threadpost

APIs Are the Next Frontier in Cybercrime

APIs make your systems easier to run -- and make it easier for hackers, too. Source: Threadpost

Lifting the veil on DeathStalker, a mercenary triumvirate

State-sponsored threat actors and sophisticated attacks are often in the spotlight. Indeed, their innovative techniques, advanced malware platforms and 0-day exploit chains capture our collective imagination. Yet these groups still aren’t...
- Advertisement -

APLICATIONS

Critical RCE Flaw in Palo Alto Gateways Hits Uber

The bug is previously unknown but yet still fixed in later releases. However, many organizations are likely still vulnerable. Source: Threadpost