DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report

The attack was mounted via SolarWinds Orion, in a manual and targeted supply-chain effort. Source: Threadpost

Microsoft Office 365 Credentials Under Attack By Fax ‘Alert’ Emails

Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with the aim of stealing their O365 credentials. Source: Threadpost

New Windows Trojan Steals Browser Credentials, Outlook Files

The newly discovered Python-based malware family targets the Outlook processes, and browser credentials, of Microsoft Windows victims. Source: Threadpost

Adaptive protection against invisible threats

Corporate endpoint security technologies for mid-sized companies struggle to surprise us with anything brand new. They provide reliable protection against malware and, when combined with relevant policies, regular updates, and employee...

Security Issues in PoS Terminals Open Consumers to Fraud

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords. Source: Threadpost

Adrozek Malware Delivers Fake Ads to 30K Devices a Day

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat. Source: Threadpost

PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers

The malware takes aim at PostgreSQL database servers with never-before-seen techniques. Source: Threadpost

Feds: K-12 Cyberattacks Dramatically on the Rise

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said. Source: Threadpost

Facebook Shutters Accounts Used in APT32 Cyberattacks

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks. Source: Threadpost

Defending the Intelligent Edge from Evolving Attacks

Fortinet's Aamir Lakhani discusses best practices for securing company data against next-gen threats, like edge access trojans (EATs). Source: Threadpost