News Wrap: PoC Exploits, Cable Haunt and Joker Malware
Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week’s news wrap.
Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week’s news wrap.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Last week, Facebook reaffirmed its hands-off approach to political ads, saying it won’t ban them, won’t fact-check them, and won’t limit how granularly they can be targeted. Under siege, Facebook has continued to defend this stance by trying to position the tech giant is a bastion of free speech. Whether in his testimony to Congress…
Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
TLDR: The Ultimate Microsoft Access Mastery Bundle collects the best training in the world’s top database management tool for only $29.99. What’s the most popular Microsoft Office app? While it’s tough to make that call with certainty, it’s hard to imagine Microsoft Word doesn’t lead that pack. Ask for other Office features that get lots…
Internet Explorer is dead, but not the mess it left behind. Microsoft earlier today issued an emergency security advisory warning millions of Windows users of a new zero-day vulnerability in Internet Explorer (IE) browser that attackers are actively exploiting in the wild — and there is no patch yet available for it. The vulnerability, tracked…
Millions of potential employees are subjected to artificial intelligence screenings during the hiring process every month. While some systems make it easier to weed out candidates who lack necessary educational or work qualifications, many AI hiring solutions are nothing more than snake oil. Thousands of companies around the world rely on outside businesses to provide…
The WeLeakInfo “data breach notification” domain is no more.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
We know what American gamers have been buying the most over the last few years, and it probably won’t surprise you that Call of Duty tops the list. But it’s Rockstar‘s magnum opus, Grand Theft Auto V, that takes the cake. US NPD SW – 2010-2019 Top 10 Sellers – Grand Theft Auto V was the best-selling game…
Researchers say that JhoneRAT has various anti-detection techniques – including making use of Google Drive, Google Forms and Twitter.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
As the headline suggests, this analysis should be seen in context. It offers only rapid arithmetic around the World Economic Forum’s (expanding) list of ‘lighthouse’ factories, which claim the most success with digital change. It considers the available data (the location and ownership of factories) from this research, and crosses the results with wider economic…