Threatpost

@threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @threatpost

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @threatpost

  1. prije 12 sati

    Sophisticated nation-state groups are increasingly using devices as an infection vector.

    Poništi
  2. prije 24 sata

    More than $1.5 million in cash and prizes has been awarded by to bug-hunters throughout 2019.

    Poništi
  3. 2. velj

    Iran-linked has been sending targeted, malicious email attachments to customers and employees of a company that works closely with U.S. government agencies.

    Poništi
  4. 1. velj

    is offering rewards of up to $20,000 for finding vulnerabilities in its gaming platform through its latest bug bounty program.

    Poništi
  5. 31. sij

    The Sodinokibi operators are sponsoring a contest offering $15,000 for proposals on zero day exploits, APT attacks, etc. (according to )

    Poništi
  6. 31. sij

    Up to 200,000 sites are vulnerable to a high-severity flaw in the popular Code Snippet plugin.

    Poništi
  7. 31. sij

    ’s patches tackle a wide range of bugs, including high-risk flaws that could allow for remote code execution.

    Poništi
  8. 30. sij

    Hackers are using as a malspam lure to distribute Emotet and other variants, according to and telemetry

    Poništi
  9. 30. sij

    Listen to Threatpost senior editor Tara Seals () talk about critical infrastructure vulnerabilities, malware and cyberattacks during the App Security and Fraud Summit, Feb. 12 at 3 p.m. EST:

    Poništi
  10. 30. sij

    🚨New Cisco patches dropped🚨 Two high-severity flaws impact over a half dozen small business switches.

    Poništi
  11. 30. sij

    Hackers breached the UN network by exploiting a SharePoint flaw - which hadn't been patched.

    Poništi
  12. 30. sij

    Dell and HP laptops have flaws allowing an attacker to access information and gain kernel privileges.

    Poništi
  13. 29. sij

    In 2019, 's bug bounty program: -paid out 461 researchers $6.5 million in rewards -tripled top reward payouts for flaws in Chrome -doubled the maximum reward amount for high-quality reports

    Poništi
  14. 29. sij

    The critical flaws exist in Adobe’s Magento e-commerce platform – a favorite target of the cybergang.

    Poništi
  15. 29. sij

    The Wawa data back in December may have impacted more than 30 million customers. Researchers at linked the breach to a dump of payment card data this week on a popular online fraud marketplace.

    Poništi
  16. 28. sij

    A new speculative execution type attack, dubbed , could allow attackers to trigger data leaks from most CPUs.

    Poništi
  17. 28. sij

    The Ring doorbell app for was caught sharing user data with and data miners.

    Poništi
  18. 28. sij

    encryption keys can easily be obtained by savvy hackers to conduct DDoS attacks and send false data to networks, researchers found.

    Poništi
  19. 28. sij

    issued fixes after researchers said its web conferences used weak authentication, making it possible for adversaries to join active calls.

    Poništi
  20. 27. sij

    Chrome and Firefox are cracking down on web browser extensions that steal user data and execute remote code.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·