Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.
Posted on 17 January 2020 | 10:01 pm
The WeLeakInfo "data breach notification" domain is no more.
Posted on 17 January 2020 | 9:46 pm
Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.
Posted on 17 January 2020 | 9:03 pm
Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?
Posted on 17 January 2020 | 6:39 pm
Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.
Posted on 17 January 2020 | 6:03 pm
The agency changed its policy to provide more timely and actionable information to state and local election officials in the case of a cybersecurity breach to election infrastructure.
Posted on 17 January 2020 | 4:56 pm
The flaws affect a key tool for managing its network platform and switches.
Posted on 16 January 2020 | 10:18 pm
iPhone users can now use Bluetooth to secure their Google accounts.
Posted on 16 January 2020 | 9:57 pm
A hellish mix of features shows the 5ss5c ransomware to be the son of Satan.
Posted on 16 January 2020 | 6:44 pm