Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions
An elaborate fraudster ring stole PII then allegedly used DoD and VA benefits portals to steal payments and funds from bank accounts.
An elaborate fraudster ring stole PII then allegedly used DoD and VA benefits portals to steal payments and funds from bank accounts.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Threatpost editors discuss this week’s biggest news – from a data breach of Bed Bath & Beyond, a tricky phishing attack and widespread APT activity.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Researchers warn XML macros embedded in SYLK files can sidestep Microsoft Office for Mac protections.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A simple attack on an unpatched server could have been catastrophic for the Utah-based utility.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Attention readers, if you are using Chrome on your Windows, Mac, and Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. With the release of Chrome 78.0.3904.87, Google is warning billions of users to install an urgent software update immediately to patch two high severity…
Researchers believe the threat group is based in China.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Skyrocketing data breaches bring incalculable losses to organizations and can cost cybersecurity executives their jobs. Here we examine the top five places in 2019 where cybercriminals are stealing corporate and government data without ever getting noticed and then learn how to avoid falling victim to unscrupulous attackers. 1. Misconfigured Cloud Storage 48% of all corporate…
Another day, another massive data breach—this time affecting a leading web technology company, as well as both of its subsidiaries, from where millions of customers around the world have purchased domain names for their websites. The world’s top domain registrars Web.com, Network Solutions, and Register.com disclosed a security breach that may have resulted in the…
A group of Chinese hackers carrying out political espionage for Beijing has been found targeting telecommunications companies with a new piece of malware designed to spy on text messages sent or received by highly targeted individuals. Dubbed “MessageTap,” the backdoor malware is a 64-bit ELF data miner that has recently been discovered installed on a…
Two grey hat hackers have pleaded guilty to blackmailing Uber, LinkedIn, and other U.S. corporations for money in exchange for promises to delete data of millions of customers they had stolen in late 2016. In a San Jose courthouse in California on Wednesday, Brandon Charles Glover (26) of Florida and Vasile Mereacre (23) of Toronto…