threatpost.com Open in urlscan Pro
35.173.160.135  Public Scan

URL: https://threatpost.com/
Submission: On March 09 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

POST /#gf_5

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_5" id="gform_5" action="/#gf_5">
  <div class="gform_body gform-body">
    <ul id="gform_fields_5" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_5_8" class="gfield field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text" for="input_5_8">Your name</label>
        <div class="ginput_container ginput_container_text"><input name="input_8" id="input_5_8" type="text" value="" class="medium" placeholder="Your name" aria-invalid="false"> </div>
      </li>
      <li id="field_5_1" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text" for="input_5_1">Your e-mail address<span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_5_1" type="text" value="" class="medium" placeholder="Your e-mail address" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_5_9" class="gfield js-kaspersky-gform-recaptcha-placeholder gform_hidden field_sublabel_below field_description_below gfield_visibility_hidden">
        <div class="ginput_container ginput_container_text"><input name="input_9" id="input_5_9" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_5_2" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text gfield_label_before_complex"><span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_checkbox">
          <ul class="gfield_checkbox" id="input_5_2">
            <li class="gchoice gchoice_5_2_1">
              <input class="gfield-choice-input" name="input_2.1" type="checkbox" value="I agree" id="choice_5_2_1">
              <label for="choice_5_2_1" id="label_5_2_1">I agree to my personal data being stored and used to receive the newsletter</label>
            </li>
          </ul>
        </div>
      </li>
      <li id="field_5_5" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text gfield_label_before_complex"><span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_checkbox">
          <ul class="gfield_checkbox" id="input_5_5">
            <li class="gchoice gchoice_5_5_1">
              <input class="gfield-choice-input" name="input_5.1" type="checkbox" value="I agree" id="choice_5_5_1">
              <label for="choice_5_5_1" id="label_5_5_1">I agree to accept information and occasional commercial offers from Threatpost partners</label>
            </li>
          </ul>
        </div>
      </li>
      <li id="field_5_10" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_5_10">Comments</label>
        <div class="ginput_container"><input name="input_10" id="input_5_10" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_5_10">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_5" class="gform_button button screen-reader-text" value="Subscribe"
      onclick="if(window[&quot;gf_submitting_5&quot;]){return false;}  window[&quot;gf_submitting_5&quot;]=true;  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_5&quot;]){return false;} window[&quot;gf_submitting_5&quot;]=true;  jQuery(&quot;#gform_5&quot;).trigger(&quot;submit&quot;,[true]); }" disabled="disabled"
      style="display: none;"> <input type="hidden" name="gform_ajax" value="form_id=5&amp;title=&amp;description=&amp;tabindex=0">
    <input type="hidden" class="gform_hidden" name="is_submit_5" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="5">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_5" value="WyJbXSIsImIwODQwZTA2ZGQ0NzYwODcyOTBkZjNmZDM1NDk2Y2ZkIl0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_5" id="gform_target_page_number_5" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_5" id="gform_source_page_number_5" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js" name="ak_js" value="1646824073910">
    <script>
      document.getElementById("ak_js").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

GET https://threatpost.com/

<form class="c-site-search__form" role="search" method="get" action="https://threatpost.com/">
  <input type="text" class="c-site-search__field" name="s" placeholder="Search">
  <button type="submit" class="c-button c-button--secondary c-button--smaller c-site-search__button" value="Search"><svg class="icon fill">
      <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg#icon-search"></use>
    </svg> Search</button>
  <div class="c-site-search__overlay"></div>
</form>

GET https://threatpost.com/

<form class="c-site-search__form" role="search" method="get" action="https://threatpost.com/">
  <input type="text" class="c-site-search__field" name="s" placeholder="Search">
  <button type="submit" class="c-button c-button--secondary c-button--smaller c-site-search__button" value="Search"><svg class="icon fill">
      <use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg#icon-search"></use>
    </svg> Search</button>
  <div class="c-site-search__overlay"></div>
</form>

Text Content

Newsletter


SUBSCRIBE TO OUR THREATPOST TODAY NEWSLETTER

Join thousands of people who receive the latest breaking cybersecurity news
every day.

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn
Park, Woburn, MA 01801. Detailed information on the processing of personal data
can be found in the privacy policy. In addition, you will find them in the
message confirming the subscription to the newsletter.

 * Your name
   
 * Your e-mail address*
   
 * 
 * *
    * I agree to my personal data being stored and used to receive the
      newsletter

 * *
    * I agree to accept information and occasional commercial offers from
      Threatpost partners

 * Comments
   
   This field is for validation purposes and should be left unchanged.



Δ

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn
Park, Woburn, MA 01801. Detailed information on the processing of personal data
can be found in the privacy policy. In addition, you will find them in the
message confirming the subscription to the newsletter.


THREATPOST

 * Podcasts
 * Malware
 * Vulnerabilities
 * InfoSec Insiders
 * Webinars

 * 
 * 
 * 
 * 
 * 
 * 
 * 

Search



FEATURED NEWS


MICROSOFT ADDRESSES 3 ZERO-DAYS & 3 CRITICAL BUGS FOR MARCH PATCH TUESDAY

The computing giant patched 71 security vulnerabilities in an
uncharacteristically light scheduled update, including its first Xbox bug.

by Tara Seals
March 8, 2022


BUG IN THE LINUX KERNEL ALLOWS PRIVILEGE ESCALATION, CONTAINER ESCAPE

by Nate Nelson
March 8, 2022

A missing check allows unprivileged attackers to escape containers and execute
arbitrary commands in the kernel.

by Nate Nelson
March 8, 2022


ZERO-CLICK FLAWS IN WIDELY USED UPS DEVICES THREATEN CRITICAL INFRATRUCTURE

The ‘TLStorm’ vulnerabilities, found in APC Smart-UPS products, could allow
attackers to cause both cyber and physical damage by taking down critical
infrastructure.

by Elizabeth Montalbano
March 8, 2022


THE UNCERTAIN FUTURE OF IT AUTOMATION

While IT automation is growing, big challenges remain. Chris Hass, director of
information security and research at Automox, discusses how the future looks.

InfoSec Insider
March 8, 2022


THREATPOST CONTENT SPOTLIGHT

 * Webinars
 * Podcasts
 * eBooks

 * Live Event
   
   
   LOG4J EXPLOIT: LESSONS LEARNED AND RISK REDUCTION BEST PRACTICES

 * On-Demand Webinar
   
   
   HOW TO ID AND PROTECT SENSITIVE CLOUD DATA: THE SECRET TO KEEPING SECRETS

 * On-Demand Webinar
   
   
   DECODING THE DATA OCEAN: SECURITY THREATS & NATURAL LANGUAGE PROCESSING

 * On-Demand Webinar
   
   
   PASSWORD RESET: CLAIMING CONTROL OF CREDENTIALS TO STOP ATTACKS

 * Listen Now
   
   
   RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST
   
   March 3, 2022
 * Listen Now
   
   
   SECURING DATA WITH A FRENZIED REMOTE WORKFORCE–PODCAST
   
   March 3, 2022
 * Listen Now
   
   
   THE ART OF NON-BORING CYBERSEC TRAINING–PODCAST
   
   February 24, 2022
 * Listen Now
   
   
   KILL CLOUD RISK: GET EVERYBODY TO STOP FIGHTING OVER APP SECURITY – PODCAST
   
   February 17, 2022

 * Download Your Free Copy
   
   
   CLOUD SECURITY: THE FORECAST FOR 2022
   
   February 15, 2022
 * Download Your Free Copy
   
   
   2021: THE EVOLUTION OF RANSOMWARE
   
   April 19, 2021
 * Download Your Free Copy
   
   
   HEALTHCARE SECURITY WOES BALLOON IN A COVID-ERA WORLD
   
   November 24, 2020
 * Download Your Free Copy
   
   
   2020 IN SECURITY: FOUR STORIES FROM THE NEW THREAT LANDSCAPE
   
   August 4, 2020


SUBSCRIBE TO OUR NEWSLETTER, THREATPOST TODAY!

Get the latest breaking news delivered daily to your inbox.

Subscribe now



LATEST NEWS


NOVEL ATTACK TURNS AMAZON DEVICES AGAINST THEMSELVES

by Nate Nelson
March 7, 2022

Researchers have discovered how to remotely manipulate the Amazon Echo through
its own speakers.

by Nate Nelson
March 7, 2022


SAMSUNG CONFIRMS LAPSUS$ RANSOMWARE HIT, SOURCE CODE LEAK

by Becky Bracken
March 7, 2022

The move comes just a week after GPU-maker NVIDIA was hit by Lapsus$ and every
employee credential was leaked.

by Becky Bracken
March 7, 2022


NVIDIA’S STOLEN CODE-SIGNING CERTS USED TO SIGN MALWARE

by Lisa Vaas
March 7, 2022

NVIDIA certificates are being used to sign malware, enabling malicious programs
to pose as legitimate and slide past security safeguards on Windows machines.

by Lisa Vaas
March 7, 2022


CRITICAL FIREFOX ZERO-DAY BUGS ALLOW RCE, SANDBOX ESCAPE

by Tara Seals
March 7, 2022

Both vulnerabilities are use-after-free issues in Mozilla’s popular web browser.

by Tara Seals
March 7, 2022


MASSIVE MERIS BOTNET EMBEDS RANSOMWARE NOTES FROM REVIL

by Lisa Vaas
March 4, 2022

Notes threatening to tank targeted companies’ stock price were embedded into the
DDoS ransomware attacks as a string_of_text directed to CEOs and webops_geeks in
the URL.

by Lisa Vaas
March 4, 2022
Load more latest news




MOST POPULAR


 * UKRAINE HIT WITH NOVEL ‘FOXBLADE’ TROJAN HOURS BEFORE INVASION
   
   March 1, 2022


 * SAMSUNG CONFIRMS LAPSUS$ RANSOMWARE HIT, SOURCE CODE LEAK
   
   March 7, 2022


 * RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST
   
   March 3, 2022


 * CRITICAL FIREFOX ZERO-DAY BUGS ALLOW RCE, SANDBOX ESCAPE
   
   March 7, 2022


 * TEABOT TROJAN HAUNTS GOOGLE PLAY STORE, AGAIN
   
   March 2, 2022


NEWSMAKER INTERVIEWS


 * PROTECTING PHONES FROM PEGASUS-LIKE SPYWARE ATTACKS
   
   July 19, 2021
   4


 * TELEGRAM FRAUDSTERS RAMP UP FORGED COVID-19 VACCINE CARD SALES
   
   May 12, 2021
   2


 * SPOTLIGHT ON CYBERCRIMINAL SUPPLY CHAINS
   
   April 22, 2021


 * BREAKING DOWN JOE BIDEN’S $10B CYBERSECURITY ‘DOWN PAYMENT’
   
   January 25, 2021
   1


 * CISOS PREP FOR COVID-19 EXPOSURE NOTIFICATION IN THE WORKPLACE
   
   January 13, 2021


MOST RECENT THREATLISTS


 * CYBER-SPIKE: ORGS SUFFER 925 ATTACKS PER WEEK, AN ALL-TIME HIGH
   
   January 10, 2022


 * PYSA EMERGES AS TOP RANSOMWARE ACTOR IN NOVEMBER
   
   December 22, 2021


 * ENCRYPTED & FILELESS MALWARE SEES BIG GROWTH
   
   October 4, 2021


 * INNOVATIVE PROXY PHANTOM ATO FRAUD RING HAUNTS ECOMMERCE ACCOUNTS
   
   September 30, 2021
   2


 * WOMEN, MINORITIES ARE HACKED MORE THAN OTHERS
   
   September 27, 2021
   6




PODCASTSVIEW ALL


ATTACKERS WILL FLOCK TO CRYPTO WALLETS, LINUX IN 2022: PODCAST

That’s just the start of what cyberattackers will zero in on as they pick up APT
techniques to hurl more destructive ransomware & supply-chain attacks, says
Fortinet’s Derek Manky.

Sponsored Content
November 23, 2021


PODCAST: COULD THE ZOHO FLAW TRIGGER SOLARWINDS 2.0?

Companies are worried that the highly privileged password app could let
attackers deep inside an enterprise’s footprint, says Redscan’s George Glass.

October 18, 2021
3


PODCAST: 67% OF ORGS HAVE BEEN HIT BY RANSOMWARE AT LEAST ONCE

Fortinet’s Derek Manky discusses a recent global survey showing that two-thirds
of organizations suffered at least one ransomware attack, while half were hit
multiple times.

Sponsored Content
October 14, 2021
1


RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST

It’s not just Ukraine: There’s a flood of intel on Russian military, nukes and
crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware
gang shuttering its leaking Jabber chat server.

March 3, 2022


SECURING DATA WITH A FRENZIED REMOTE WORKFORCE–PODCAST

Stock the liquor cabinet and take a shot whenever you hear GitLab Staff Security
Researcher Mark Loveless say “Zero Trust.”

March 3, 2022


THE ART OF NON-BORING CYBERSEC TRAINING–PODCAST

With human error being the common factor in most cyberattacks, employee training
has got to get better. To that end, Trustwave cybersec training expert Darren
Van Booven explains the importance of fish stress balls and management buy-in.

February 24, 2022


KILL CLOUD RISK: GET EVERYBODY TO STOP FIGHTING OVER APP SECURITY – PODCAST

When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity
between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt
share tips on quashing all the squabbling.

February 17, 2022


EX-GUMSHOE NABS CYBERCROOKS WITH FBI TACTICS

Crane Hassold, former FBI analyst turned director of threat intel at Abnormal
Security, shares stories from his covert work tracking cyberattackers.

February 9, 2022


HOW TO BUY PRECIOUS PATCHING TIME AS LOG4J EXPLOITS FLY

Podcast: Cybereason shares details about its vaccine: a fast shot in the arm
released within hours of the Apache Log4j zero-day horror show being disclosed.

December 14, 2021
1


ATTACKERS WILL FLOCK TO CRYPTO WALLETS, LINUX IN 2022: PODCAST

That’s just the start of what cyberattackers will zero in on as they pick up APT
techniques to hurl more destructive ransomware & supply-chain attacks, says
Fortinet’s Derek Manky.

Sponsored Content
November 23, 2021


PODCAST: COULD THE ZOHO FLAW TRIGGER SOLARWINDS 2.0?

Companies are worried that the highly privileged password app could let
attackers deep inside an enterprise’s footprint, says Redscan’s George Glass.

October 18, 2021
3


PODCAST: 67% OF ORGS HAVE BEEN HIT BY RANSOMWARE AT LEAST ONCE

Fortinet’s Derek Manky discusses a recent global survey showing that two-thirds
of organizations suffered at least one ransomware attack, while half were hit
multiple times.

Sponsored Content
October 14, 2021
1


RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST

It’s not just Ukraine: There’s a flood of intel on Russian military, nukes and
crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware
gang shuttering its leaking Jabber chat server.

March 3, 2022


SECURING DATA WITH A FRENZIED REMOTE WORKFORCE–PODCAST

Stock the liquor cabinet and take a shot whenever you hear GitLab Staff Security
Researcher Mark Loveless say “Zero Trust.”

March 3, 2022


THE ART OF NON-BORING CYBERSEC TRAINING–PODCAST

With human error being the common factor in most cyberattacks, employee training
has got to get better. To that end, Trustwave cybersec training expert Darren
Van Booven explains the importance of fish stress balls and management buy-in.

February 24, 2022


KILL CLOUD RISK: GET EVERYBODY TO STOP FIGHTING OVER APP SECURITY – PODCAST

When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity
between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt
share tips on quashing all the squabbling.

February 17, 2022


EX-GUMSHOE NABS CYBERCROOKS WITH FBI TACTICS

Crane Hassold, former FBI analyst turned director of threat intel at Abnormal
Security, shares stories from his covert work tracking cyberattackers.

February 9, 2022


HOW TO BUY PRECIOUS PATCHING TIME AS LOG4J EXPLOITS FLY

Podcast: Cybereason shares details about its vaccine: a fast shot in the arm
released within hours of the Apache Log4j zero-day horror show being disclosed.

December 14, 2021
1


ATTACKERS WILL FLOCK TO CRYPTO WALLETS, LINUX IN 2022: PODCAST

That’s just the start of what cyberattackers will zero in on as they pick up APT
techniques to hurl more destructive ransomware & supply-chain attacks, says
Fortinet’s Derek Manky.

Sponsored Content
November 23, 2021


PODCAST: COULD THE ZOHO FLAW TRIGGER SOLARWINDS 2.0?

Companies are worried that the highly privileged password app could let
attackers deep inside an enterprise’s footprint, says Redscan’s George Glass.

October 18, 2021
3


PODCAST: 67% OF ORGS HAVE BEEN HIT BY RANSOMWARE AT LEAST ONCE

Fortinet’s Derek Manky discusses a recent global survey showing that two-thirds
of organizations suffered at least one ransomware attack, while half were hit
multiple times.

Sponsored Content
October 14, 2021
1
View all podcasts


VIDEOSVIEW ALL


HOW THE PANDEMIC IS RESHAPING THE BUG-BOUNTY LANDSCAPE

Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty
hunters, bug bounty program adoption and more.

October 28, 2020


EXPERTS WEIGH IN ON E-COMMERCE SECURITY AMID SNOWBALLING THREATS

How a retail sector reeling from COVID-19 can lock down their online systems to
prevent fraud during the upcoming holiday shopping spike.

October 28, 2020


CYBERCRIMINALS STEP UP THEIR GAME AHEAD OF U.S. ELECTIONS

Ahead of the November U.S. elections, cybercriminals are stepping up their
offensive in both attacks against security infrastructure and disinformation
campaigns – but this time, social media giants, the government and citizens are
more prepared.

October 21, 2020


LYCEUM APT RETURNS, THIS TIME TARGETING TUNISIAN FIRMS

The APT, which targets Middle-Eastern energy firms & telecoms, has been
relatively quiet since its exposure but not entirely silent. It’s kept up
attacks through 2021 and is working on retooling its arsenal yet again. 

October 19, 2021


NATIONAL SURVEILLANCE CAMERA ROLLOUT ROILS PRIVACY ACTIVISTS

TALON, a network of smart, connected security cameras developed by the
Atlanta-based startup and installed by law enforcement around the country,
raises surveillance-related privacy concerns.

March 4, 2021
4


MALWARE GANGS PARTNER UP IN DOUBLE-PUNCH SECURITY THREAT

From TrickBot to Ryuk, more malware cybercriminal groups are putting their heads
together when attacking businesses.

February 26, 2021


HOW EMAIL ATTACKS ARE EVOLVING IN 2021

The money being wire transferred by business email compromise victims is on the
rise, as cybersecurity criminals evolve their tactics.

February 11, 2021
1


PATRICK WARDLE ON HACKERS LEVERAGING ‘POWERFUL’ IOS BUGS IN HIGH-LEVEL ATTACKS

Noted Apple security expert Patrick Wardle discusses how cybercriminals are
stepping up their game in targeting Apple users with new techniques and
cyberattacks.

December 22, 2020


RANSOMWARE AND IP THEFT: TOP COVID-19 HEALTHCARE SECURITY SCARES

From ransomware attacks that crippled hospitals, to espionage attacks targeting
COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security
risks.

December 15, 2020


HOW THE PANDEMIC IS RESHAPING THE BUG-BOUNTY LANDSCAPE

Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty
hunters, bug bounty program adoption and more.

October 28, 2020


EXPERTS WEIGH IN ON E-COMMERCE SECURITY AMID SNOWBALLING THREATS

How a retail sector reeling from COVID-19 can lock down their online systems to
prevent fraud during the upcoming holiday shopping spike.

October 28, 2020


CYBERCRIMINALS STEP UP THEIR GAME AHEAD OF U.S. ELECTIONS

Ahead of the November U.S. elections, cybercriminals are stepping up their
offensive in both attacks against security infrastructure and disinformation
campaigns – but this time, social media giants, the government and citizens are
more prepared.

October 21, 2020


LYCEUM APT RETURNS, THIS TIME TARGETING TUNISIAN FIRMS

The APT, which targets Middle-Eastern energy firms & telecoms, has been
relatively quiet since its exposure but not entirely silent. It’s kept up
attacks through 2021 and is working on retooling its arsenal yet again. 

October 19, 2021


NATIONAL SURVEILLANCE CAMERA ROLLOUT ROILS PRIVACY ACTIVISTS

TALON, a network of smart, connected security cameras developed by the
Atlanta-based startup and installed by law enforcement around the country,
raises surveillance-related privacy concerns.

March 4, 2021
4


MALWARE GANGS PARTNER UP IN DOUBLE-PUNCH SECURITY THREAT

From TrickBot to Ryuk, more malware cybercriminal groups are putting their heads
together when attacking businesses.

February 26, 2021


HOW EMAIL ATTACKS ARE EVOLVING IN 2021

The money being wire transferred by business email compromise victims is on the
rise, as cybersecurity criminals evolve their tactics.

February 11, 2021
1


PATRICK WARDLE ON HACKERS LEVERAGING ‘POWERFUL’ IOS BUGS IN HIGH-LEVEL ATTACKS

Noted Apple security expert Patrick Wardle discusses how cybercriminals are
stepping up their game in targeting Apple users with new techniques and
cyberattacks.

December 22, 2020


RANSOMWARE AND IP THEFT: TOP COVID-19 HEALTHCARE SECURITY SCARES

From ransomware attacks that crippled hospitals, to espionage attacks targeting
COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security
risks.

December 15, 2020


HOW THE PANDEMIC IS RESHAPING THE BUG-BOUNTY LANDSCAPE

Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty
hunters, bug bounty program adoption and more.

October 28, 2020


EXPERTS WEIGH IN ON E-COMMERCE SECURITY AMID SNOWBALLING THREATS

How a retail sector reeling from COVID-19 can lock down their online systems to
prevent fraud during the upcoming holiday shopping spike.

October 28, 2020


CYBERCRIMINALS STEP UP THEIR GAME AHEAD OF U.S. ELECTIONS

Ahead of the November U.S. elections, cybercriminals are stepping up their
offensive in both attacks against security infrastructure and disinformation
campaigns – but this time, social media giants, the government and citizens are
more prepared.

October 21, 2020
View all videos


SLIDESHOWVIEW ALL


TOP 2018 SECURITY AND PRIVACY STORIES

The top cybersecurity and privacy trends that biggest impact in 2018.

December 26, 2018
3


2019: THE YEAR AHEAD IN CYBERSECURITY

What are the top cyber trends to watch out for in 2019? Here’s what we’re
hearing.

December 25, 2018
10


2018: A BANNER YEAR FOR BREACHES

A look back at the blizzard of breaches that made up 2018.

December 24, 2018
2


2020 CYBERSECURITY TRENDS TO WATCH

Mobile becomes a prime phishing attack vector, hackers will increasingly employ
machine learning in attacks and cloud will increasingly be seen as fertile
ground for compromise.

December 31, 2019


TOP MOBILE SECURITY STORIES OF 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone
jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the
news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.

December 30, 2019


FACEBOOK SECURITY DEBACLES: 2019 YEAR IN REVIEW

2019 was a tumultuous year for Facebook as it continued to grapple with privacy
fallout after Cambridge Analytica, as well as dealing with a slew of security
challenges.

December 27, 2019


BIGGEST MALWARE THREATS OF 2019

2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take
a look back.

December 24, 2019
1


TOP 10 IOT DISASTERS OF 2019

From more widescale, powerful distributed denial of service (DDoS) attacks, to
privacy issues in children’s connected toys, here are the top IoT disasters in
2019.

December 23, 2019
1


2019 MALWARE TRENDS TO WATCH

Here are 10 top malware trends to watch for in the New Year.

January 1, 2019


TOP 2018 SECURITY AND PRIVACY STORIES

The top cybersecurity and privacy trends that biggest impact in 2018.

December 26, 2018
3


2019: THE YEAR AHEAD IN CYBERSECURITY

What are the top cyber trends to watch out for in 2019? Here’s what we’re
hearing.

December 25, 2018
10


2018: A BANNER YEAR FOR BREACHES

A look back at the blizzard of breaches that made up 2018.

December 24, 2018
2


2020 CYBERSECURITY TRENDS TO WATCH

Mobile becomes a prime phishing attack vector, hackers will increasingly employ
machine learning in attacks and cloud will increasingly be seen as fertile
ground for compromise.

December 31, 2019


TOP MOBILE SECURITY STORIES OF 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone
jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the
news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.

December 30, 2019


FACEBOOK SECURITY DEBACLES: 2019 YEAR IN REVIEW

2019 was a tumultuous year for Facebook as it continued to grapple with privacy
fallout after Cambridge Analytica, as well as dealing with a slew of security
challenges.

December 27, 2019


BIGGEST MALWARE THREATS OF 2019

2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take
a look back.

December 24, 2019
1


TOP 10 IOT DISASTERS OF 2019

From more widescale, powerful distributed denial of service (DDoS) attacks, to
privacy issues in children’s connected toys, here are the top IoT disasters in
2019.

December 23, 2019
1


2019 MALWARE TRENDS TO WATCH

Here are 10 top malware trends to watch for in the New Year.

January 1, 2019


TOP 2018 SECURITY AND PRIVACY STORIES

The top cybersecurity and privacy trends that biggest impact in 2018.

December 26, 2018
3


2019: THE YEAR AHEAD IN CYBERSECURITY

What are the top cyber trends to watch out for in 2019? Here’s what we’re
hearing.

December 25, 2018
10


2018: A BANNER YEAR FOR BREACHES

A look back at the blizzard of breaches that made up 2018.

December 24, 2018
2
View all slideshows

NEXT 00:02 01:35 360p 720p HD 1080p HD Auto (360p) About Connatix V154011 Closed
Captions About Connatix V154011

1/1 Skip Ad Continue watching after the ad Visit Advertiser websiteGO TO PAGE




SUBSCRIBE TO OUR NEWSLETTER, THREATPOST TODAY!

Get the latest breaking news delivered daily to your inbox.

Subscribe now
Threatpost

The First Stop For Security News

 * Home
 * About Us
 * Contact Us
 * Advertise With Us
 * RSS Feeds

 * Copyright © 2022 Threatpost
 * Privacy Policy
 * Terms and Conditions
 * Advertise

 * 
 * 
 * 
 * 
 * 
 * 
 * 


TOPICS

 * Black Hat
 * Breaking News
 * Cloud Security
 * Critical Infrastructure
 * Cryptography
 * Facebook
 * Government
 * Hacks
 * IoT
 * Malware
 * Mobile Security
 * Podcasts
 * Privacy
 * RSAC
 * Security Analyst Summit
 * Videos
 * Vulnerabilities
 * Web Security

Threatpost
 * 
 * 
 * 
 * 
 * 
 * 
 * 


TOPICS

 * Cloud Security
 * Malware
 * Vulnerabilities
 * Privacy

Show all
 * Black Hat
 * Critical Infrastructure
 * Cryptography
 * Facebook
 * Featured
 * Government
 * Hacks
 * IoT
 * Mobile Security
 * Podcasts
 * RSAC
 * Security Analyst Summit
 * Slideshow
 * Videos
 * Web Security


AUTHORS

 * Tara Seals
 * Tom Spring
 * Lisa Vaas


THREATPOST

 * Home
 * About Us
 * Contact Us
 * Advertise With Us
 * RSS Feeds

Search

 * 
 * 
 * 
 * 
 * 
 * 
 * 

InfoSec Insider


INFOSEC INSIDER POST

Infosec Insider content is written by a trusted community of Threatpost
cybersecurity subject matter experts. Each contribution has a goal of bringing a
unique voice to important cybersecurity topics. Content strives to be of the
highest quality, objective and non-commercial.

Sponsored


SPONSORED CONTENT

Sponsored Content is paid for by an advertiser. Sponsored content is written and
edited by members of our sponsor community. This content creates an opportunity
for a sponsor to provide insight and commentary from their point-of-view
directly to the Threatpost audience. The Threatpost editorial team does not
participate in the writing or editing of Sponsored Content.

We use cookies to make your experience of our websites better. By using and
further navigating this website you accept this. Detailed information about the
use of cookies on this website is available by clicking on more information.

ACCEPT AND CLOSE

Notifications