The 5 Most-Wanted Threatpost Stories of 2020

A look back at what was hot with readers — offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year. Continue reading The 5 Most-Wanted Threatpost Stories of 2020

Dark Web Pricing Skyrockets for Microsoft RDP Servers, Payment-Card Data

Underground marketplace pricing on RDP server access, compromised payment card data and DDoS-For-Hire services are surging. Continue reading Dark Web Pricing Skyrockets for Microsoft RDP Servers, Payment-Card Data

Record Levels of Software Bugs Plague Short-Staffed IT Teams in 2020

As just one symptom, 83 percent of the Top 30 U.S. retailers have vulnerabilities which pose an “imminent” cyber-threat, including Amazon, Costco, Kroger and Walmart. Continue reading Record Levels of Software Bugs Plague Short-Staffed IT Teams in 2020

Pandemic, A Driving Force in 2021 Financial Crime

Ransomware gangs with zero-days and more players overall will characterize financially motivated cyberattacks next year. Continue reading Pandemic, A Driving Force in 2021 Financial Crime

ThreatList: Cyber Monday Looms – But Shoppers Oblivious to Top Retail Threats

Online shoppers are blissfully unaware of credit card skimming threats and malicious shopping apps as they head into this year’s Black Friday and Cyber Monday holiday shopping events. Continue reading ThreatList: Cyber Monday Looms – But Shoppers Oblivious to Top Retail Threats

Changing Employee Security Behavior Takes More Than Simple Awareness

Designing a behavioral change program requires an audit of existing security practices and where the sticking points are. Continue reading Changing Employee Security Behavior Takes More Than Simple Awareness

ThreatList: Pharma Mobile Phishing Attacks Turn to Malware

After the breakout of the COVID-19 pandemic, mobile phishing attacks targeting pharmaceutical companies have shifted their focus from credential theft to malware delivery. Continue reading ThreatList: Pharma Mobile Phishing Attacks Turn to Malware

Cybercrime Moves to the Cloud to Accelerate Attacks Amid Data Glut

A report on the underground economy finds that malicious actors are offering cloud-based troves of stolen data, accessible with handy tools to slice and dice what’s on offer. Continue reading Cybercrime Moves to the Cloud to Accelerate Attacks Amid Data Glut

APT Groups Finding Success with Mix of Old and New Tools

The APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, largely supercharged by geo-politics, a report finds. Continue reading APT Groups Finding Success with Mix of Old and New Tools