Wednesday, August 15, 2018
           (757) 873-6707                     Monday - Friday, 9 am - 5:30pm
Threatpost RSA Conference 2018 Preview Threatpost's Tom Spring and Lindsey O'Donnell talk about the top security trends that they are watching out for at the 2018 RSA Conference this week in San Francisco.
Calls For Regulation Build After Facebook Privacy Fallout Political actors and privacy activists are calling for more regulations on data privacy after Facebook's data security scandal.
New ‘Early Bird’ Code Injection Technique Helps APT33 Evade Detection Researchers have identified what they are calling an Early Bird code injection technique used by the Iranian group APT33 to burrow the TurnedUp malware inside infected systems while evading anti-malware tools.
AMD Rolls Out Spectre Fixes AMD notified users about new available Spectre CPU firmware and Windows 10 patches.

Latest News

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Armis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security.

ThreatList: Almost All Security Pros Believe Election Systems Are at Risk

Respondents in a survey from Venafi said they believe voting machines, encrypted communications from polling stations and databases that store voter registration data are all vulnerable.

Podcast: Black Hat and DEF CON 2018 Wrap

The Threatpost team debriefs on the top news and topics from last week's Black Hat and DEF CON conferences.

New Variant of KeyPass Ransomware Discovered

Samples of the malware have been found in an array of countries, including Brazil and Vietnam.

Black Hat 2018: IoT Security Issues Will Lead to Legal ‘Feeding Frenzy’

A \\"wave of litigation over IoT liability is on the horizon,\\" according to an attorney who has represented plaintiffs in the 2015 Jeep hack.

GoDaddy Leaks ‘Map of the Internet’ via Amazon S3 Cloud Bucket Misconfig

Configuration data for GoDaddy servers could be used as a reconnaissance tool for malicious actors to uncover ripe targets.

DEF CON 2018: ‘Man in the Disk’ Attack Surface Affects All Android Phones

Sloppy Android developers not following security guidelines for external storage opens the door to device takeover and more.

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Mike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.

DEF CON 2018: Voting Hacks Prompt Push Back from Election Officials, Vendors

The Vote Hacking Village invited attendees – including kids as young as six – to hack the voting infrastructure, including ballot machines, a voter database and more.

DEF CON 2018: Critical Bug Opens Millions of HP OfficeJet Printers to Attack

A malicious fax sent to an HP Inc. OfficeJet all-in-one inkjet printer can give hackers control of the printer and act as a springboard into an attached network environment.