How to Write a Cybersecurity Playbook During a Pandemic
IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.
Source: Threadpost
Transparent Tribe: Evolution analysis,part 2
Background + Key findings
Transparent Tribe, also known as PROJECTM or MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. In the last four...
Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform
Researchers have unearthed more vulnerabilities in Microsoft’s IoT security solution.
Source: Threadpost
Safari Bug Revealed After Apple Takes Nearly a Year to Patch
Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files.
Source: Threadpost
Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages
The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals.
Source: Threadpost
Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem
With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem...
Google Fixes High-Severity Chrome Browser Code Execution Bug
The high-severity flaw, which was patched in the latest version of Google's Chrome browser, could allow code execution.
Source: Threadpost
Iran-Linked ‘Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports
The recent Dharma campaign by Iran-linked script kiddies shows that the ransomware is being spread not just by sophisticated, state-sponsored actors anymore.
Source: Threadpost
APIs Are the Next Frontier in Cybercrime
APIs make your systems easier to run -- and make it easier for hackers, too.
Source: Threadpost
Lifting the veil on DeathStalker, a mercenary triumvirate
State-sponsored threat actors and sophisticated attacks are often in the spotlight. Indeed, their innovative techniques, advanced malware platforms and 0-day exploit chains capture our collective imagination. Yet these groups still aren’t...