Mike Mimoso Chris Brook public
[search 0]
More

Download the App!

show episodes
 
Loading …
show series
 
Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.…
 
Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.…
 
Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).…
 
Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet.By Mike Mimoso, Chris Brook
 
Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said durin…
 
Cybercriminals are recognizing that the data that automotive companies have to offer - from customer and employee personal identifiable information (PII) to financial data - are invaluable. Paul Proudhomme, cyber threat intelligence analyst at IntSights, warns that this is translating into cyberattacks - whether it's aimed at Intellectual Property …
 
This Halloween week, Threatpost editors break down the scariest stories haunting the security space, including: A wave of ransomware attacks targeting a number of hospitals, sparking worries about healthcare security and the impact on patents during COVID-19 "Zombie" vulnerabilities - including Zerologon and SMBGhost - that continued to haunt syste…
 
Chris Eng, chief research officer with Veracode, warns that the deluge of in-person shoppers during the pandemic has pushed restaurants, boutique shops and other retailers to utilize new online software ecommerce platforms - but they aren't prepared for implementing the correct security measures for these platforms.…
 
Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, said that cybercriminals cashed in on the surge of COVID-19 earlier this year with phishing emails purporting to be from healthcare professionals offering more resources and information about the pandemic.…
 
The Threatpost editors break down the top security stories of the week ended Oct. 16, including: Patch Tuesday insanity, with Microsoft and Adobe releasing fixes for severe vulnerabilities - including a critical, potentially wormable remote code execution Microsoft vulnerability Barnes and Noble being hacked - and why some readers are unhappy with …
 
Larry Cashdollar shares his craziest bug finding stories, including a flaw (CVE-1999-0765) found during his position as a UNIX Systems Administrator, which existed in the SGI IRIX midikeys program - and accidentally threw a wrench in a demo for a navy admiral on the Aegis destroyer class ship.By Mike Mimoso, Chris Brook
 
With the U.S. presidential elections looming, disinformation is a top challenge. In the four years since the previous 2016 presidential election, threat actors have created an entire sophisticated and intricate industry around misinformation - raising the bar for social media companies to detect and protect against this threat, new Wednesday Cisco …
 
Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week ended Aug. 21, including: IBM, the owner of the Weather Channel mobile app, has reached a settlement with the Los Angeles city attorney's office after a 2019 lawsuit alleged that the app was deceiving its users in how it was using their geolo…
 
Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls. Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continu…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login