Threat Post – Threat Post – LIVE EVENT, MONDAY JULY 11: Join Threatpost and Intel Security’s Tom Garrison in a live conversation about innovation enabling stakeholders to stay ahead of…
Tag: Intel
US Senate passes Bill to ban goods produced from Uyghur forced labour
The US Senate on Thursday unanimously passed a Bill banning the import of all goods, including technology, produced in the Chinese region of Xinjiang to penalise the Chinese government for…
The Log4j Vulnerability Is Now Used by State-Backed Hackers
The vulnerability, officially tagged as CVE-2021-44228 and called Log4Shell or LogJam, is an unauthenticated RCE vulnerability that allows total system takeover on systems running Log4j 2.0-beta9 through 2.14.1. What Happened? Nation-state hackers…
Ransomware Attackers Have ‘Industry Standards’ Too
Security Intelligence – Security Intelligence – Ransomware Attackers Have ‘Industry Standards’ Too Ransomware attackers are creating ‘industry standards’ and using them to define an ideal target for their campaigns. The…
Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks
Researchers from ETH Zurich conducted a study to investigate who is more prone to fall victim to phishing cyberattacks in a corporate context. The study involved 14,733 participants and was…
Variant of Phorpiex botnet used for cryptocurrency attacks in Ethopia, Nigeria, India and more
Check Point Research has discovered new attacks targeting cryptocurrency users in Ethiopia, Nigeria, India and 93 other countries. The cybercriminals behind the attacks are using a variant of the Phorpiex…
All Change at the Top as New Ransomware Groups Emerge
All Change at the Top as New Ransomware Groups Emerge The Ransomware as a Service (RaaS) landscape underwent another major shift in the third quarter as new variants emerged to…