Inspiring Digital Excellence

My Articles

Articles from Sources I like

New JhoneRAT Malware Targets Middle East

Researchers say that JhoneRAT has various anti-detection techniques - including making use of Google Drive, Google Forms and Twitter.

Posted on 17 January 2020 | 10:01 pm

Feds Cut Off Access to Billions of Breached Records with Site Takedown

The WeLeakInfo "data breach notification" domain is no more.

Posted on 17 January 2020 | 9:46 pm

Mobile Carrier Customer Service Ushers in SIM-Swap Fraud

Weak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.

Posted on 17 January 2020 | 9:03 pm

Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea?

Are publicly released proof-of-concept exploits more helpful for system defenders -- or bad actors?

Posted on 17 January 2020 | 6:39 pm

News Wrap: PoC Exploits, Cable Haunt and Joker Malware

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

Posted on 17 January 2020 | 6:03 pm

FBI Plans to Inform States of Election Breaches

The agency changed its policy to provide more timely and actionable information to state and local election officials in the case of a cybersecurity breach to election infrastructure.

Posted on 17 January 2020 | 4:56 pm

Critical Cisco Flaws Now Have PoC Exploit

The flaws affect a key tool for managing its network platform and switches.

Posted on 16 January 2020 | 10:18 pm

Google Account Security Keys Launch for iPhone

iPhone users can now use Bluetooth to secure their Google accounts.

Posted on 16 January 2020 | 9:57 pm

Satan Ransomware Reborn to Torment Businesses

A hellish mix of features shows the 5ss5c ransomware to be the son of Satan.

Posted on 16 January 2020 | 6:44 pm