Threatpost | The first stop for security news

The First Stop For Security News

10/21/2017 03:00 PM
New Magniber Ransomware Targets South Korea, Asia Pacific
Researchers identified a new ransomware family called Magniber that uniquely only targets users in South Korea and the Asia Pacific regions.

10/20/2017 07:17 PM
‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says Researcher
Malware dubbed IOTroop that researchers say is "worse than Mirai" has already infected one million businesses worldwide.

10/20/2017 05:05 PM
Necurs-Based DDE Attacks Now Spreading Locky Ransomware
Researchers have spotted Locky ransomware infections emanating from the Necurs botnet via Word attachments using a DDE technique that Microsoft says is an Office feature and does not merit a security patch.

10/20/2017 03:15 PM
Threatpost News Wrap, Oct. 20, 2017
This week's Threatpost News Wrap Podcast recaps the ROCA, KRACK and Boundhook attacks, as well as the release of Google Advanced Protection for Gmail.

10/20/2017 12:00 PM
Cisco Warns 69 Products Impacted by KRACK
Cisco patched a critical bug in its Cloud Services Platform 2100 hardware and at the same time told customers 96 of its products are vulnerable to KRACK vulnerabilities.

10/19/2017 08:26 PM
Google Play Bounty Promises $1,000 Rewards for Flaws in Popular Apps
Google announced a public bug bounty for Google Play that brings developers and researchers together to find and patch flaws in popular apps.

10/19/2017 07:26 PM
Hackers Take Aim at SSH Keys in New Attacks
SSH private keys are being targeted by hackers who have stepped up the scanning of thousands of WordPress website in search of private keys.

10/19/2017 02:51 PM
Google Advanced Protection Trades Ease-of-Use for Security
Experts applaud a new Google service, Advanced Protection, which beefs up account password protection and limits access to a user’s Gmail and Drive.

10/18/2017 09:08 PM
FBI Asks Businesses to Share Details About DDoS Attacks
The FBI has made an appeal to organizations victimized by DDoS attacks to share details and characteristics of those incidents.

10/18/2017 06:37 PM
BoundHook Attack Exploits Intel Skylake MPX Feature
A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.