Threatpost for B2B
The First Stop For Security News
Updated: 12 hours 43 min ago
Instead of relying on their own sites to host malware, hackers are using a series of strings of malicious backdoor code on Pastebin sites and calling upon it to execute malware.
Spam campaigns in the U.K. are using Office macros to spread the Dridex banking Trojan, researchers at Trustwave report.
Security researchers are tracking a new version of the Emomet malware that is targeting users’ banking credentials and also has the ability to steal email usernames and passwords, which are then used to send spam from compromised accounts. The new variant of Emomet has mostly been seen targeting users in Germany, but researchers at Microsoft […]
Morgan Stanley says it has fired an employee who allegedly stole information from 10 percent of the firm's wealth management clients with the intent of selling that data online.
Researchers have detected a malvertising campaign running on a pair of sites owned by Huffington Post that is using ads distributed through an AOL ad network. The attack is sending victims through a series of redirects that eventually brings them to a landing page that is running an exploit kit.
An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.
Some Skype users have reported seeing malicious ads inside their Skype clients in recent days that lead to a site that tries to download a fake Adobe or Java update.
A researcher has called out U.K.-based personalized greeting card vendor Moonpig for a 17-month-old vulnerability that puts customer and payment card data at risk.
The CERT Coordination Center at the Software Engineering Institute at Carnegie Mellon University issued three advisories today warning of serious UEFI vulnerabilities.
Microsoft is warning of a significant uptick in threats tricking users to enable macros and then infecting them with malicious macros files.
A new Wi-Fi hacking tool, called wifiphisher, automates phishing attacks over WPA networks.
Bitstamp, a Bitcoin exchange based in the United Kingdom, remains offline this morning following what appears to have been a compromise over the weekend.
The maintainers of the Openwall security enhanced Linux distribution have released a new stable version, which includes fixes for a number of serious vulnerabilities, such as the Shellshock Bash bug and the flaw in SSLv3 that leads to the POODLE attack. Openwall is designed to be a small, compact Linux distribution for servers, appliances and […]
President Obama signed an Executive Order sanctioning three North Korea defense agencies and 10 individuals for the country's alleged role in the Sony hack.
Google's Project Zero disclosed details of a Windows privilege elevation vulnerability. Google said it reported the to Microsoft but it has yet to be patched.
Researchers warn that since public disclosure of a file-upload vulnerability in the WordPress Symposium plug-in and the availability of proof-of-concept exploit code, scans and exploit attempts are on the rise.
Reports emerge suggesting a data breach may have occurred, compromising the payment card data of customers who dined at Chik-fil-A.
A new year begins at midnight and Threatpost highlights seven things you're bound to contend with in 2015.
A vulnerability was discovered and patched in a third-party service that handles resumes on Facebook’s careers page.
Researchers at the Chaos Computer Club conference in Hamburg presented research on the woeful state of security in 4G USB modems.