Threatpost
-
Threat Intelligence
FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
The FanDuel online sportsbook has told its users to be on the lookout for phishing cyberattacks in the wake of…
-
Threat Intelligence
Ransomware Profits Decline as Victims Dig In, Refuse to Pay
In another sign that the tide may be finally turning against ransomware actors, ransom payments declined substantially in 2022 as…
-
Threat Intelligence
Attackers Crafted Custom Malware for Fortinet Zero-Day
Researchers analyzing data associated with a recently disclosed zero-day vulnerability in Fortinet’s FortiOS SSL-VPN technology have identified a sophisticated new…
-
Threat Intelligence
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for multifactor authentication increasingly has made telecom providers a juicy target for cybercrime. An…
-
Threat Intelligence
Name That Toon: Poker Hand
New year, new cartoon contest! We’re flushed with excitement, knowing our clever, cybersecurity-minded readers are going to come up with…
-
Threat Intelligence
New Coalfire Report Reveals CISOs Rising Influence
WESTMINSTER, Colo., Jan. 18, 2023 /PRNewswire/ — In partnership with the world-class Dark Reading research team, global cybersecurity pioneer Coalfire today unveiled its second…
-
Threat Intelligence
ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
The newly released ChatGPT artificial intelligence bot from OpenAI could be used to usher in a new dangerous wave of…
-
Threat Intelligence
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
Names such as Novelli, orangecake, Pirat-Networks, SubComandanteVPN, and zirochka are unlikely to mean anything to a vast majority of enterprise…
-
Threat Intelligence
Microsoft to Block Excel Add-ins to Stop Office Exploits
Microsoft plans to add a feature to Office Excel that will make it harder for cyberattackers to exploit the spreadsheet…
-
Threat Intelligence
‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
We imagine that the world’s most successful hackers write their own dangerous code and invest heavily in the technologies they…