Security
Headlines
HeadlinesLatestCVEs

Source

Threatpost

How to Build an Incident-Response Plan, Before Security Disaster Strikes

Joseph Carson, Chief Security Scientist at ThycoticCentrify, offers a 7-step practical IR checklist for ensuring a swift recovery from a cyberattack.

Threatpost
#Breach#Cloud Security#InfoSec Insider#Malware#Mobile Security#Vulnerabilities#Web Security
Facebook Blames Outage on Faulty Router Configuration

One easily disproved conspiracy theory linked the ~six-hour outage to a supposed data breach tied to a Sept. 22 hacker forum ad for 1.5B Facebook user records.

Oops! Compound DeFi Platform Gives Out $90M, Would Like it Back, Please

The Compound cryptocurrency exchange accidentally botched a platform upgrade and distributed millions in free COMP tokens to users - then threatened to dox the recipients.

Facebook Outage Drags Down Instagram, WhatsApp, Messenger, Oculus VR

They were all flat on their faces for hours on Monday, throwing off DNS error messages or other server-related errors.

Encrypted & Fileless Malware Sees Big Growth

An analysis of second-quarter malware trends shows that threats are becoming stealthier.

Transnational Fraud Ring Bilks U.S. Military Service Members Out of Millions

A former medical records tech stole PII that was then used to fraudulently claim DoD and VA benefits, particularly targeting disabled veterans.

MFA Glitch Leads to 6K+ Coinbase Customers Getting Robbed

Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA.

3.1M Neiman Marcus Customer Card Details Breached

Experts say the detection delay of 17 months is a colossal security blunder by the retailer.

Flubot Malware Targets Androids With Fake Security Updates

The banking trojan keeps switching up its lies, trying to fool Android users into clicking on a fake Flubot-deleting app or supposedly uploaded photos of recipients.

New APT ChamelGang Targets Russian Energy, Aviation Orgs

First appearing in March, the group has been leveraging ProxyShell against targets in 10 countries and employs a variety of malware to steal data from compromised networks.