Microsoft Exchange, Outlook Under Siege By APTs

A new threat report shows that APTs are switching up their tactics when exploiting Microsoft services like Exchange and OWA, in order to avoid detection. Continue reading Microsoft Exchange, Outlook Under Siege By APTs

Microsoft Fixes RCE Flaws in Out-of-Band Windows Update

The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution. Continue reading Microsoft Fixes RCE Flaws in Out-of-Band Windows Update

Biden Campaign Staffers Targeted in Cyberattack Leveraging Anti-Virus Lure, Dropbox Ploy

Google’s Threat Analysis Group sheds more light on targeted credential phishing and malware attacks on the staff of Joe Biden’s presidential campaign. Continue reading Biden Campaign Staffers Targeted in Cyberattack Leveraging Anti-Virus Lure, Dropbox Ploy

Phishing Lures Shift from COVID-19 to Job Opportunities

Fortinet researchers are seeing a pivot in the spear-phishing and phishing lures used by cybercriminals, to entice potential job candidates as businesses open up. Continue reading Phishing Lures Shift from COVID-19 to Job Opportunities

Dickey’s BBQ Breach: Meaty 3M Payment Card Upload Drops on Joker’s Stash

After cybercriminals smoked out 3 million compromised payment cards on the Joker’s Stash marketplace, researchers linked the data to a breach at the popular barbecue franchise. Continue reading Dickey’s BBQ Breach: Meaty 3M Payment Card Upload Drops on Joker’s Stash

News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and More

From a cyberattack on Barnes & Noble to Zoom rolling out end-to-end encryption, Threatpost editors break down the top security stories of the week. Continue reading News Wrap: Barnes & Noble Hack, DDoS Extortion Threats and More

Critical Magento Holes Open Online Shops to Code Execution

Adobe says the two critical flaws (CVE-2020-24407 and CVE-2020-24400) could allow arbitrary code execution as well as read or write access to the database. Continue reading Critical Magento Holes Open Online Shops to Code Execution

Zoom Rolls Out End-to-End Encryption After Setbacks

After backlash over false marketing around its encryption policies, Zoom will finally roll out end-to-end encryption next week. Continue reading Zoom Rolls Out End-to-End Encryption After Setbacks

Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On

Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS attacks on their network unless a $230K ransom is paid. Continue reading Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On

Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips

Intel’s addition of memory encryption to its upcoming 3rd generation Xeon Scalable processors matches AMD’s Secure Memory Encryption (SME) feature. Continue reading Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips