threatpost.com
Open in
urlscan Pro
35.173.160.135
Public Scan
URL:
https://threatpost.com/
Submission: On March 23 via api from US — Scanned from DE
Submission: On March 23 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMPOST /#gf_5
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_5" id="gform_5" action="/#gf_5">
<div class="gform_body gform-body">
<ul id="gform_fields_5" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_5_8" class="gfield field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text" for="input_5_8">Your name</label>
<div class="ginput_container ginput_container_text"><input name="input_8" id="input_5_8" type="text" value="" class="medium" placeholder="Your name" aria-invalid="false"> </div>
</li>
<li id="field_5_1" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text" for="input_5_1">Your e-mail address<span
class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_1" id="input_5_1" type="text" value="" class="medium" placeholder="Your e-mail address" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_5_9" class="gfield js-kaspersky-gform-recaptcha-placeholder gform_hidden field_sublabel_below field_description_below gfield_visibility_hidden">
<div class="ginput_container ginput_container_text"><input name="input_9" id="input_5_9" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_5_2" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text gfield_label_before_complex"><span
class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_checkbox">
<ul class="gfield_checkbox" id="input_5_2">
<li class="gchoice gchoice_5_2_1">
<input class="gfield-choice-input" name="input_2.1" type="checkbox" value="I agree" id="choice_5_2_1">
<label for="choice_5_2_1" id="label_5_2_1">I agree to my personal data being stored and used to receive the newsletter</label>
</li>
</ul>
</div>
</li>
<li id="field_5_5" class="gfield input-without-label label-gdpr gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label screen-reader-text gfield_label_before_complex"><span
class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_checkbox">
<ul class="gfield_checkbox" id="input_5_5">
<li class="gchoice gchoice_5_5_1">
<input class="gfield-choice-input" name="input_5.1" type="checkbox" value="I agree" id="choice_5_5_1">
<label for="choice_5_5_1" id="label_5_5_1">I agree to accept information and occasional commercial offers from Threatpost partners</label>
</li>
</ul>
</div>
</li>
<li id="field_5_10" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_5_10">Email</label>
<div class="ginput_container"><input name="input_10" id="input_5_10" type="text" value=""></div>
<div class="gfield_description" id="gfield_description_5_10">This field is for validation purposes and should be left unchanged.</div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_5" class="gform_button button screen-reader-text" value="Subscribe"
onclick="if(window["gf_submitting_5"]){return false;} window["gf_submitting_5"]=true; "
onkeypress="if( event.keyCode == 13 ){ if(window["gf_submitting_5"]){return false;} window["gf_submitting_5"]=true; jQuery("#gform_5").trigger("submit",[true]); }" disabled="disabled"
style="display: none;"> <input type="hidden" name="gform_ajax" value="form_id=5&title=&description=&tabindex=0">
<input type="hidden" class="gform_hidden" name="is_submit_5" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="5">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_5" value="WyJbXSIsImIwODQwZTA2ZGQ0NzYwODcyOTBkZjNmZDM1NDk2Y2ZkIl0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_5" id="gform_target_page_number_5" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_5" id="gform_source_page_number_5" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1648025619506">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
GET https://threatpost.com/
<form class="c-site-search__form" role="search" method="get" action="https://threatpost.com/">
<input type="text" class="c-site-search__field" name="s" placeholder="Search">
<button type="submit" class="c-button c-button--secondary c-button--smaller c-site-search__button" value="Search"><svg class="icon fill">
<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg#icon-search"></use>
</svg> Search</button>
<div class="c-site-search__overlay"></div>
</form>
GET https://threatpost.com/
<form class="c-site-search__form" role="search" method="get" action="https://threatpost.com/">
<input type="text" class="c-site-search__field" name="s" placeholder="Search">
<button type="submit" class="c-button c-button--secondary c-button--smaller c-site-search__button" value="Search"><svg class="icon fill">
<use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg#icon-search"></use>
</svg> Search</button>
<div class="c-site-search__overlay"></div>
</form>
Text Content
Newsletter SUBSCRIBE TO OUR THREATPOST TODAY NEWSLETTER Join thousands of people who receive the latest breaking cybersecurity news every day. The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. * Your name * Your e-mail address* * * * * I agree to my personal data being stored and used to receive the newsletter * * * I agree to accept information and occasional commercial offers from Threatpost partners * Email This field is for validation purposes and should be left unchanged. Δ The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. THREATPOST * Podcasts * Malware * Vulnerabilities * InfoSec Insiders * Webinars * * * * * * * Search FEATURED NEWS LAPSUS$ DATA KIDNAPPERS CLAIM SNATCHES FROM MICROSOFT, OKTA Lapsus$ shared screenshots of internal Okta systems and 40Gb of purportedly stolen Microsoft data on Bing, Bing Maps and Cortana. by Lisa Vaas March 22, 2022 SERPENT BACKDOOR SLITHERS INTO ORGS USING CHOCOLATEY INSTALLER by Elizabeth Montalbano March 22, 2022 An unusual attack using an open-source Python package installer called Chocolatey, steganography and Scheduled Tasks is stealthily delivering spyware to companies. by Elizabeth Montalbano March 22, 2022 RUSSIA LAYS GROUNDWORK FOR CYBERATTACKS ON US INFRASTRUCTURE – WHITE HOUSE “Evolving intelligence” shows Russia amping up for cyber-war in response to Ukraine-related sanctions, the White House said — but researchers warn that many orgs are not prepared. by Tara Seals March 22, 2022 BROWSER-IN-THE-BROWSER ATTACK MAKES PHISHING NEARLY INVISIBLE Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al. by Lisa Vaas March 21, 2022 1 THREATPOST CONTENT SPOTLIGHT * Webinars * Podcasts * eBooks * On-Demand Webinar LOG4J EXPLOIT: LESSONS LEARNED AND RISK REDUCTION BEST PRACTICES * On-Demand Webinar HOW TO ID AND PROTECT SENSITIVE CLOUD DATA: THE SECRET TO KEEPING SECRETS * On-Demand Webinar DECODING THE DATA OCEAN: SECURITY THREATS & NATURAL LANGUAGE PROCESSING * On-Demand Webinar PASSWORD RESET: CLAIMING CONTROL OF CREDENTIALS TO STOP ATTACKS * Listen Now REPORTING MANDATES TO CLEAR UP FEDS’ HAZY LOOK INTO THREAT LANDSCAPE – PODCAST March 17, 2022 * Listen Now STAFF THINK CONTI GROUP IS A LEGIT EMPLOYER – PODCAST March 14, 2022 * Listen Now MULTI-RANSOMWARED VICTIMS HAVE IT COMING–PODCAST March 10, 2022 * Listen Now RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST March 3, 2022 * Download Your Free Copy CLOUD SECURITY: THE FORECAST FOR 2022 February 15, 2022 * Download Your Free Copy 2021: THE EVOLUTION OF RANSOMWARE April 19, 2021 * Download Your Free Copy HEALTHCARE SECURITY WOES BALLOON IN A COVID-ERA WORLD November 24, 2020 * Download Your Free Copy 2020 IN SECURITY: FOUR STORIES FROM THE NEW THREAT LANDSCAPE August 4, 2020 SUBSCRIBE TO OUR NEWSLETTER, THREATPOST TODAY! Get the latest breaking news delivered daily to your inbox. Subscribe now LATEST NEWS FIDO: HERE’S ANOTHER KNIFE TO HELP MURDER PASSWORDS by Nate Nelson March 22, 2022 After years of promising a passwordless future – really, any day now! – FIDO is proposing tweaks to WebAuthn that could put us out of password misery. Experts aren’t so sure. by Nate Nelson March 22, 2022 FACESTEALER TROJAN HIDDEN IN GOOGLE PLAY PLUNDERS FACEBOOK ACCOUNTS by Tara Seals March 21, 2022 The trojanized Craftsart Cartoon Photo Tools app is available in the official Android app store, but it’s actually spyware capable of stealing any and all information from victims’ social-media accounts. by Tara Seals March 21, 2022 CONTI RANSOMWARE V. 3, INCLUDING DECRYPTOR, LEAKED by Lisa Vaas March 21, 2022 2 The latest is a fresher version of the ransomware pro-Ukraine researcher ContiLeaks already released, but it’s reportedly clunkier code. by Lisa Vaas March 21, 2022 2 BRIDGESTONE HIT AS RANSOMWARE TORCHES TOYOTA SUPPLY CHAIN by Nate Nelson March 21, 2022 1 A ransomware attack struck Bridgestone Americas, weeks after another Toyota supplier experienced the same and a third reported some kind of cyber hit. by Nate Nelson March 21, 2022 1 AGENCIES WARN ON SATELLITE HACKS & GPS JAMMING AFFECTING AIRPLANES, CRITICAL INFRASTRUCTURE by Tara Seals March 18, 2022 1 The Russian invasion of Ukraine has coincided with the jamming of airplane navigation systems and hacks on the SATCOM networks that empower critical infrastructure. by Tara Seals March 18, 2022 1 Load more latest news MOST POPULAR * REPORTING MANDATES TO CLEAR UP FEDS’ HAZY LOOK INTO THREAT LANDSCAPE – PODCAST March 17, 2022 * DEV SABOTAGES POPULAR NPM PACKAGE TO PROTEST RUSSIAN INVASION March 17, 2022 10 * BRIDGESTONE HIT AS RANSOMWARE TORCHES TOYOTA SUPPLY CHAIN March 21, 2022 1 * BROWSER-IN-THE-BROWSER ATTACK MAKES PHISHING NEARLY INVISIBLE March 21, 2022 1 * PHONY INSTAGRAM ‘SUPPORT STAFF’ EMAILS HIT INSURANCE COMPANY March 16, 2022 NEWSMAKER INTERVIEWS * PROTECTING PHONES FROM PEGASUS-LIKE SPYWARE ATTACKS July 19, 2021 4 * TELEGRAM FRAUDSTERS RAMP UP FORGED COVID-19 VACCINE CARD SALES May 12, 2021 2 * SPOTLIGHT ON CYBERCRIMINAL SUPPLY CHAINS April 22, 2021 * BREAKING DOWN JOE BIDEN’S $10B CYBERSECURITY ‘DOWN PAYMENT’ January 25, 2021 1 * CISOS PREP FOR COVID-19 EXPOSURE NOTIFICATION IN THE WORKPLACE January 13, 2021 MOST RECENT THREATLISTS * CYBER-SPIKE: ORGS SUFFER 925 ATTACKS PER WEEK, AN ALL-TIME HIGH January 10, 2022 * PYSA EMERGES AS TOP RANSOMWARE ACTOR IN NOVEMBER December 22, 2021 * ENCRYPTED & FILELESS MALWARE SEES BIG GROWTH October 4, 2021 * INNOVATIVE PROXY PHANTOM ATO FRAUD RING HAUNTS ECOMMERCE ACCOUNTS September 30, 2021 2 * WOMEN, MINORITIES ARE HACKED MORE THAN OTHERS September 27, 2021 6 PODCASTSVIEW ALL KILL CLOUD RISK: GET EVERYBODY TO STOP FIGHTING OVER APP SECURITY – PODCAST When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt share tips on quashing all the squabbling. February 17, 2022 EX-GUMSHOE NABS CYBERCROOKS WITH FBI TACTICS Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his covert work tracking cyberattackers. February 9, 2022 HOW TO BUY PRECIOUS PATCHING TIME AS LOG4J EXPLOITS FLY Podcast: Cybereason shares details about its vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show being disclosed. December 14, 2021 1 REPORTING MANDATES TO CLEAR UP FEDS’ HAZY LOOK INTO THREAT LANDSCAPE – PODCAST It’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill. As it is, visibility into adversary behavior has been muck. March 17, 2022 STAFF THINK CONTI GROUP IS A LEGIT EMPLOYER – PODCAST The ransomware group’s benefits – bonuses, employee of the month, performance reviews & top-notch training – might be better than yours, says BreachQuest’s Marco Figueroa. March 14, 2022 MULTI-RANSOMWARED VICTIMS HAVE IT COMING–PODCAST Let’s blame the victim. IT decision makers’ confidence about security doesn’t jibe with their concession that repeated incidents are their own fault, says ExtraHop’s Jamie Moles. March 10, 2022 RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST It’s not just Ukraine: There’s a flood of intel on Russian military, nukes and crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware gang shuttering its leaking Jabber chat server. March 3, 2022 SECURING DATA WITH A FRENZIED REMOTE WORKFORCE–PODCAST Stock the liquor cabinet and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say “Zero Trust.” March 3, 2022 THE ART OF NON-BORING CYBERSEC TRAINING–PODCAST With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in. February 24, 2022 KILL CLOUD RISK: GET EVERYBODY TO STOP FIGHTING OVER APP SECURITY – PODCAST When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt share tips on quashing all the squabbling. February 17, 2022 EX-GUMSHOE NABS CYBERCROOKS WITH FBI TACTICS Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his covert work tracking cyberattackers. February 9, 2022 HOW TO BUY PRECIOUS PATCHING TIME AS LOG4J EXPLOITS FLY Podcast: Cybereason shares details about its vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show being disclosed. December 14, 2021 1 REPORTING MANDATES TO CLEAR UP FEDS’ HAZY LOOK INTO THREAT LANDSCAPE – PODCAST It’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill. As it is, visibility into adversary behavior has been muck. March 17, 2022 STAFF THINK CONTI GROUP IS A LEGIT EMPLOYER – PODCAST The ransomware group’s benefits – bonuses, employee of the month, performance reviews & top-notch training – might be better than yours, says BreachQuest’s Marco Figueroa. March 14, 2022 MULTI-RANSOMWARED VICTIMS HAVE IT COMING–PODCAST Let’s blame the victim. IT decision makers’ confidence about security doesn’t jibe with their concession that repeated incidents are their own fault, says ExtraHop’s Jamie Moles. March 10, 2022 RUSSIA LEAKS DATA FROM A THOUSAND CUTS–PODCAST It’s not just Ukraine: There’s a flood of intel on Russian military, nukes and crooks, says dark-web intel expert Vinny Troia, even with the Conti ransomware gang shuttering its leaking Jabber chat server. March 3, 2022 SECURING DATA WITH A FRENZIED REMOTE WORKFORCE–PODCAST Stock the liquor cabinet and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say “Zero Trust.” March 3, 2022 THE ART OF NON-BORING CYBERSEC TRAINING–PODCAST With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in. February 24, 2022 KILL CLOUD RISK: GET EVERYBODY TO STOP FIGHTING OVER APP SECURITY – PODCAST When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt share tips on quashing all the squabbling. February 17, 2022 EX-GUMSHOE NABS CYBERCROOKS WITH FBI TACTICS Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his covert work tracking cyberattackers. February 9, 2022 HOW TO BUY PRECIOUS PATCHING TIME AS LOG4J EXPLOITS FLY Podcast: Cybereason shares details about its vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show being disclosed. December 14, 2021 1 View all podcasts VIDEOSVIEW ALL HOW THE PANDEMIC IS RESHAPING THE BUG-BOUNTY LANDSCAPE Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty hunters, bug bounty program adoption and more. October 28, 2020 EXPERTS WEIGH IN ON E-COMMERCE SECURITY AMID SNOWBALLING THREATS How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike. October 28, 2020 CYBERCRIMINALS STEP UP THEIR GAME AHEAD OF U.S. ELECTIONS Ahead of the November U.S. elections, cybercriminals are stepping up their offensive in both attacks against security infrastructure and disinformation campaigns – but this time, social media giants, the government and citizens are more prepared. October 21, 2020 LYCEUM APT RETURNS, THIS TIME TARGETING TUNISIAN FIRMS The APT, which targets Middle-Eastern energy firms & telecoms, has been relatively quiet since its exposure but not entirely silent. It’s kept up attacks through 2021 and is working on retooling its arsenal yet again. October 19, 2021 NATIONAL SURVEILLANCE CAMERA ROLLOUT ROILS PRIVACY ACTIVISTS TALON, a network of smart, connected security cameras developed by the Atlanta-based startup and installed by law enforcement around the country, raises surveillance-related privacy concerns. March 4, 2021 4 MALWARE GANGS PARTNER UP IN DOUBLE-PUNCH SECURITY THREAT From TrickBot to Ryuk, more malware cybercriminal groups are putting their heads together when attacking businesses. February 26, 2021 HOW EMAIL ATTACKS ARE EVOLVING IN 2021 The money being wire transferred by business email compromise victims is on the rise, as cybersecurity criminals evolve their tactics. February 11, 2021 1 PATRICK WARDLE ON HACKERS LEVERAGING ‘POWERFUL’ IOS BUGS IN HIGH-LEVEL ATTACKS Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks. December 22, 2020 RANSOMWARE AND IP THEFT: TOP COVID-19 HEALTHCARE SECURITY SCARES From ransomware attacks that crippled hospitals, to espionage attacks targeting COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security risks. December 15, 2020 HOW THE PANDEMIC IS RESHAPING THE BUG-BOUNTY LANDSCAPE Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty hunters, bug bounty program adoption and more. October 28, 2020 EXPERTS WEIGH IN ON E-COMMERCE SECURITY AMID SNOWBALLING THREATS How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike. October 28, 2020 CYBERCRIMINALS STEP UP THEIR GAME AHEAD OF U.S. ELECTIONS Ahead of the November U.S. elections, cybercriminals are stepping up their offensive in both attacks against security infrastructure and disinformation campaigns – but this time, social media giants, the government and citizens are more prepared. October 21, 2020 LYCEUM APT RETURNS, THIS TIME TARGETING TUNISIAN FIRMS The APT, which targets Middle-Eastern energy firms & telecoms, has been relatively quiet since its exposure but not entirely silent. It’s kept up attacks through 2021 and is working on retooling its arsenal yet again. October 19, 2021 NATIONAL SURVEILLANCE CAMERA ROLLOUT ROILS PRIVACY ACTIVISTS TALON, a network of smart, connected security cameras developed by the Atlanta-based startup and installed by law enforcement around the country, raises surveillance-related privacy concerns. March 4, 2021 4 MALWARE GANGS PARTNER UP IN DOUBLE-PUNCH SECURITY THREAT From TrickBot to Ryuk, more malware cybercriminal groups are putting their heads together when attacking businesses. February 26, 2021 HOW EMAIL ATTACKS ARE EVOLVING IN 2021 The money being wire transferred by business email compromise victims is on the rise, as cybersecurity criminals evolve their tactics. February 11, 2021 1 PATRICK WARDLE ON HACKERS LEVERAGING ‘POWERFUL’ IOS BUGS IN HIGH-LEVEL ATTACKS Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks. December 22, 2020 RANSOMWARE AND IP THEFT: TOP COVID-19 HEALTHCARE SECURITY SCARES From ransomware attacks that crippled hospitals, to espionage attacks targeting COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security risks. December 15, 2020 HOW THE PANDEMIC IS RESHAPING THE BUG-BOUNTY LANDSCAPE Bugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty hunters, bug bounty program adoption and more. October 28, 2020 EXPERTS WEIGH IN ON E-COMMERCE SECURITY AMID SNOWBALLING THREATS How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike. October 28, 2020 CYBERCRIMINALS STEP UP THEIR GAME AHEAD OF U.S. ELECTIONS Ahead of the November U.S. elections, cybercriminals are stepping up their offensive in both attacks against security infrastructure and disinformation campaigns – but this time, social media giants, the government and citizens are more prepared. October 21, 2020 View all videos SLIDESHOWVIEW ALL TOP 2018 SECURITY AND PRIVACY STORIES The top cybersecurity and privacy trends that biggest impact in 2018. December 26, 2018 3 2019: THE YEAR AHEAD IN CYBERSECURITY What are the top cyber trends to watch out for in 2019? Here’s what we’re hearing. December 25, 2018 10 2018: A BANNER YEAR FOR BREACHES A look back at the blizzard of breaches that made up 2018. December 24, 2018 2 2020 CYBERSECURITY TRENDS TO WATCH Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise. December 31, 2019 TOP MOBILE SECURITY STORIES OF 2019 Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019. December 30, 2019 FACEBOOK SECURITY DEBACLES: 2019 YEAR IN REVIEW 2019 was a tumultuous year for Facebook as it continued to grapple with privacy fallout after Cambridge Analytica, as well as dealing with a slew of security challenges. December 27, 2019 BIGGEST MALWARE THREATS OF 2019 2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take a look back. December 24, 2019 1 TOP 10 IOT DISASTERS OF 2019 From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children’s connected toys, here are the top IoT disasters in 2019. December 23, 2019 1 2019 MALWARE TRENDS TO WATCH Here are 10 top malware trends to watch for in the New Year. January 1, 2019 TOP 2018 SECURITY AND PRIVACY STORIES The top cybersecurity and privacy trends that biggest impact in 2018. December 26, 2018 3 2019: THE YEAR AHEAD IN CYBERSECURITY What are the top cyber trends to watch out for in 2019? Here’s what we’re hearing. December 25, 2018 10 2018: A BANNER YEAR FOR BREACHES A look back at the blizzard of breaches that made up 2018. December 24, 2018 2 2020 CYBERSECURITY TRENDS TO WATCH Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise. December 31, 2019 TOP MOBILE SECURITY STORIES OF 2019 Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019. December 30, 2019 FACEBOOK SECURITY DEBACLES: 2019 YEAR IN REVIEW 2019 was a tumultuous year for Facebook as it continued to grapple with privacy fallout after Cambridge Analytica, as well as dealing with a slew of security challenges. December 27, 2019 BIGGEST MALWARE THREATS OF 2019 2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take a look back. December 24, 2019 1 TOP 10 IOT DISASTERS OF 2019 From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children’s connected toys, here are the top IoT disasters in 2019. December 23, 2019 1 2019 MALWARE TRENDS TO WATCH Here are 10 top malware trends to watch for in the New Year. January 1, 2019 TOP 2018 SECURITY AND PRIVACY STORIES The top cybersecurity and privacy trends that biggest impact in 2018. December 26, 2018 3 2019: THE YEAR AHEAD IN CYBERSECURITY What are the top cyber trends to watch out for in 2019? Here’s what we’re hearing. December 25, 2018 10 2018: A BANNER YEAR FOR BREACHES A look back at the blizzard of breaches that made up 2018. December 24, 2018 2 View all slideshows NEXT 00:02 01:20 360p 720p HD 1080p HD Auto (360p) About Connatix V155403 Closed Captions About Connatix V155403 1/1 Skip Ad Continue watching after the ad Visit Advertiser websiteGO TO PAGE SUBSCRIBE TO OUR NEWSLETTER, THREATPOST TODAY! Get the latest breaking news delivered daily to your inbox. Subscribe now Threatpost The First Stop For Security News * Home * About Us * Contact Us * Advertise With Us * RSS Feeds * Copyright © 2022 Threatpost * Privacy Policy * Terms and Conditions * Advertise * * * * * * * TOPICS * Black Hat * Breaking News * Cloud Security * Critical Infrastructure * Cryptography * Facebook * Government * Hacks * IoT * Malware * Mobile Security * Podcasts * Privacy * RSAC * Security Analyst Summit * Videos * Vulnerabilities * Web Security Threatpost * * * * * * * TOPICS * Cloud Security * Malware * Vulnerabilities * Privacy Show all * Black Hat * Critical Infrastructure * Cryptography * Facebook * Featured * Government * Hacks * IoT * Mobile Security * Podcasts * RSAC * Security Analyst Summit * Slideshow * Videos * Web Security AUTHORS * Tara Seals * Tom Spring * Lisa Vaas THREATPOST * Home * About Us * Contact Us * Advertise With Us * RSS Feeds Search * * * * * * * InfoSec Insider INFOSEC INSIDER POST Infosec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial. Sponsored SPONSORED CONTENT Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content. We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information. ACCEPT AND CLOSE Notifications