News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and More
From a cyberattack on Barnes & Noble to Zoom rolling out end-to-end encryption, Threatpost editors break down the top security stories of the week.
From a cyberattack on Barnes & Noble to Zoom rolling out end-to-end encryption, Threatpost editors break down the top security stories of the week.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The habitability of a planet depends on many factors. One is the existence of a strong and long-lived magnetic field. These fields are generated thousands of kilometers below the planet’s surface in its liquid core and extend far into space – shielding the atmosphere from harmful solar radiation. Without a strong magnetic field, a planet…
After cybercriminals smoked out 3 million compromised payment cards on the Joker’s Stash marketplace, researchers linked the data to a breach at the popular barbecue franchise.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Black holes are perhaps the most mysterious objects in nature. They warp space and time in extreme ways and contain a mathematical impossibility, a singularity – an infinitely hot and dense object within. But if black holes exist and are truly black, how exactly would we ever be able to make an observation? This morning…
Google’s Threat Analysis Group sheds more light on targeted credential phishing and malware attacks on the staff of Joe Biden’s presidential campaign.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
TLDR: With over 20 expert services in the RankTools SEO Tool package, you’ll know how to reach the top of the Google search rankings and build traffic to your content. Over 94 percent of all internet searches happen on a Google property — and the volume of Google searches grows by roughly 10 percent each…
The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Carl Pei has in many ways been the public face of OnePlus, along with fellow co-founder Pete Lau. But today, after seven years with the company, Pei announced he was leaving in a blog post on OnePlus’ community forums. It’s unclear if there’s any specific reason for his departure. Rumors have suggested Pei is moving…
Marking a pivot from COVID-19 scams, researchers track a single threat actor through the evolution from the pandemic to PayPal, and on to more timely voter scams — all with the same infrastructure.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
I’m underground, back where it all started. Sitting at the hidden cafe where I first met Mike. I’d been studying in my bedroom for the past 9-months and decided to step out of the cave. Half of me was concerned about having to pay $19 for breakfast (unless it’s Christmas, driving Uber on the weekends isn’t very…