News

On-demand Event: Join Threatpost and Intel Security’s Tom Garrison in a live conversation about innovation enabling stakeholders to stay ahead of a dynamic threat landscape and what Intel ...
Threatpost is a long-running, independent source of news and analysis about the cybersecurity landscape, covering breaking news and threat research, malware and vulnerability analysis, long-term ...
Join us for this on-demand Threatpost Webinar with Keeper Security. In this on-demand Threatpost Town Hall, We will discuss topics related to challenges organizations face protecting sensitive ...
A flaw in all versions of the popular C standard libraries uClibc and uClibc-ng can allow for DNS poisoning attacks against target devices. An unpatched Domain Name System (DNS) bug in a popular ...
Ransomware is a growing scourge, but recent months have seen a growing sophistication and level of innovation in this slice of the cybercrime underbelly. This eBook sets out to arm organizations ...
In 2020, the healthcare industry began a massive shift, as legacy cybersecurity issues merged with new security challenges spurred on by the spread of COVID-19. The pandemic has forced budget ...
A patch fixes exploit hidden in Elden Ring that traps PC players in a ‘death loop.’ The latest installment of the Dark Souls gaming franchise, Elden Ring, contains a security vulnerability ...
The country’s FSB said that it raided gang hideouts; seized currency, cars and personnel; and neutralized REvil’s infrastructure. At the request of U.S. authorities. Russia’s Federal ...
The malware establishes initial access on targeted machines, then waits for additional code to execute. A brand-new multiplatform malware, likely distributed via malicious npm packages, is ...
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said. The routers leveraged by the ...
UPDATE: Researchers have a working exploit for the vulnerability (now patched), which allows for unauthenticated RCE and affects what Palo Alto clarified is an estimated 10,000 VPN/firewalls.