Cybersecurity News
Three Charged in July 15 Twitter Compromise
Three individuals have been charged for their alleged roles in the July 15 hack on Twitter, an incident that resulted in Twitter profiles for some of the world's most recognizable celebrities, executives and public figures sending out tweets advertising a bitcoin scam.31 July 2020
4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users
The flaws have been confirmed by Grandstream, but no firmware update has yet been issued.31 July 2020
3 Arrested for Massive Twitter Breach
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.31 July 2020
Authorities Arrest Alleged 17-Year-Old ‘Mastermind’ Behind Twitter Hack
Three have been arrested in alleged connection with the recent high-profile Twitter hack - including a 17-year-old teen from Florida who is the reported "mastermind" behind the attack.31 July 2020
Florida teen arrested for orchestrating Twitter hack
Main suspect identified as Graham Ivan Clark, a 17-year-old teen from Tampa, Florida.31 July 2020
New Initiative Links Cybersecurity Pros to Election Officials
A University of Chicago Harris School of Public Policy initiative will build a database of cybersecurity volunteers.31 July 2020
CWT Travel Agency Faces $4.5M Ransom in Cyberattack, Report
The corporate-travel leader has confirmed an attack that knocked systems offline.31 July 2020
Anti-NATO Disinformation Campaign Leveraged CMS Compromises
Researchers uncovered a disinformation campaign aiming to discredit NATO via fake news content on compromised news websites.31 July 2020
Twitter: Employees Compromised in Phone Spear-Phishing Attack
The attack earlier this month started with a spear-phishing attack targeting Twitter employees, the company says in a new update.31 July 2020
Week in security with Tony Anscombe
New ESET Threat Report is out – Defending against Thunderspy attacks – Thousands of databases wiped in Meow attacks
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
31 July 2020
Twitter breach: Staff tricked by ‘phone spear phishing’
The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures
The post Twitter breach: Staff tricked by ‘phone spear phishing’ appeared first on WeLiveSecurity
31 July 2020
What's Next for PCI SSC Mobile Payments Security Standards?
PCI SSC has published Software-based PIN-entry on COTS (SPoC)™ v1.1, Contactless Payments on COTS (CPoC™) v1.0 and has updated Technical FAQs for both. So, what is next for new standards development in mobile?
31 July 2020
3 Ways Social Distancing Can Strengthen your Network
Security teams can learn a lot from the current pandemic to make modern hybrid business networks stronger and more resilient. Here's how.31 July 2020
'Hidden Property Abusing' Allows Attacks on Node.js Applications
A team of researchers from Georgia Tech find a new attack technique that targets properties in Node.js and plan to publicly release a tool that has already identified 13 new vulnerabilities.31 July 2020
Twitter: Epic Account Hack Caused by Mobile Spearphishing Scam
Hackers "mislead certain employees" to gain access to internal tools to take over high-profile accounts and push out a Bitcoin scam.31 July 2020
BootHole fixes causing boot problems across multiple Linux distros
Debian, Ubuntu, Red Hat, CentOS, Fedora users reports issues with booting or dual-booting their devices.31 July 2020
Black Hat USA 2020 Preview: Election Security, COVID Disinformation and More
Threatpost editors break down the top themes, speakers and sessions to look out for this year at Black Hat 2020 - from election security to remote work and the pandemic.31 July 2020
China arrests over 100 people suspected of involvement in PlusToken cryptocurrency scam
Many of the alleged fraudsters had previously fled overseas.31 July 2020
Mimecast acquires communication security provider MessageControl
The email and data security firm says the deal will help protect customers against phishing campaigns.31 July 2020
Theoretical technique to abuse EMV cards detected used in the real world
Known as EMV-Bypass Cloning, a technique first described in 2008 has been seen abused in the wild this year.31 July 2020