IT Security News

  • Black Hat and DEF CON Roundup

    ‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.

    read more 

  • Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics

    The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.

    read more 

  • Sounding the Alarm on Emergency Alert System Flaws

    The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System -- a national public warning system used to deliver important emergency information, such as severe weather and AMBER alerts. The DHS warning came in advance of a workshop to be held this weekend at the DEFCON security conference in Las Vegas, where a security researcher is slated to demonstrate multiple weaknesses in the nationwide alert system.

    read more 

  • Facebook’s In-app Browser on iOS Tracks ‘Anything You Do on Any Website’

    Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites.

    read more 

  • It Might Be Our Data, But It’s Not Our Breach

    A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans. The firm's analysis of the data suggests it corresponds to current and former customers of AT&T. The telecommunications giant stopped short of saying the data wasn't theirs, but it maintains the records do not appear to have come from its systems and may be tied to a previous data incident at another company.

    read more 

  • Starlink Successfully Hacked Using $25 Modchip

    Belgian researcher Lennert Wouters revealed at Black Hat how he mounted a successful fault injection attack on a user terminal for SpaceX’s satellite-based internet system

    read more 

  • New Hacker Forum Takes Pro-Ukraine Stance

    A uniquely politically motivated site called DUMPS focuses solely on threat activity directed against Russia and Belarus

    read more 

  • Cisco Confirms Network Breach Via Hacked Employee Google Account

    Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.

    read more 

  • Inside the Hackers’ Toolkit – Podcast

    This edition of the Threatpost podcast is sponsored by Egress.

    read more 

  • The Security Pros and Cons of Using Email Aliases

    One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character after the username portion of your email address -- followed by a notation specific to the site you're signing up at -- lets you create an infinite number of unique email addresses tied to the same account. Aliases can help users detect breaches and fight spam. But not all websites allow aliases, and they can complicate account recovery. Here's a look at the pros and cons of adopting a unique alias for each website.

    read more