threatpost Profile Banner
Threatpost Profile
Threatpost

@threatpost

Followers
212K
Following
655
Media
1K
Statuses
23K

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Joined January 2009
Don't wanna be here? Send us removal request.
@threatpost
Threatpost
3 years
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Tweet card summary image
threatpost.com
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
9
30
42
@threatpost
Threatpost
3 years
2.5 million people were affected, in a breach that could spell more trouble down the line.
Tweet card summary image
threatpost.com
2.5 million people were affected, in a breach that could spell more trouble down the line.
2
24
35
@grok
Grok
6 days
Join millions who have switched to Grok.
248
488
4K
@threatpost
Threatpost
3 years
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Tweet card summary image
threatpost.com
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
0
14
14
@threatpost
Threatpost
3 years
Twitter is blasted for #security and #privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
Tweet card summary image
threatpost.com
Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
1
21
15
@threatpost
Threatpost
3 years
Attackers are spoofing the widely used #cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.
Tweet card summary image
threatpost.com
Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.
0
20
19
@threatpost
Threatpost
3 years
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
Tweet card summary image
threatpost.com
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
0
9
4
@threatpost
Threatpost
3 years
Fake #travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Tweet card summary image
threatpost.com
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
1
13
5
@threatpost
Threatpost
3 years
Over 130 companies tangled in sprawling #phishing campaign that spoofed a multi-factor authentication system.
Tweet card summary image
threatpost.com
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
0
18
13
@threatpost
Threatpost
3 years
Lockbit is by far this summer’s most prolific #ransomware group, trailed by two offshoots of the Conti group.
Tweet card summary image
threatpost.com
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
0
12
18
@threatpost
Threatpost
3 years
Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites.
Tweet card summary image
threatpost.com
Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites.
1
19
17
@threatpost
Threatpost
3 years
Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational data destruction.
Tweet card summary image
threatpost.com
Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational data destruction.
0
11
11
@threatpost
Threatpost
3 years
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
Tweet card summary image
threatpost.com
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
0
18
15
@threatpost
Threatpost
3 years
Instances of #phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.
Tweet card summary image
threatpost.com
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.
0
14
11
@threatpost
Threatpost
3 years
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Tweet card summary image
threatpost.com
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
0
12
19
@threatpost
Threatpost
3 years
Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites.
Tweet card summary image
threatpost.com
Researcher shows how Instagram and Facebook’s use of an in-app browser within both its iOS apps can track interactions with external websites.
1
18
14
@threatpost
Threatpost
3 years
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
Tweet card summary image
threatpost.com
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
1
11
6
@threatpost
Threatpost
3 years
Twitter is blasted for #security and #privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
Tweet card summary image
threatpost.com
Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
0
6
4
@threatpost
Threatpost
3 years
The CISA has seen a resurgence of the #malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
Tweet card summary image
threatpost.com
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
0
10
12
@threatpost
Threatpost
3 years
Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, #DDoS and RDP.
Tweet card summary image
threatpost.com
Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, DDoS and RDP.
0
9
12
@threatpost
Threatpost
3 years
300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.
Tweet card summary image
threatpost.com
300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.
0
11
10