• img January 17, 2020

New JhoneRAT Malware Targets Middle East

This post was originally published on this siteResearchers say that JhoneRAT has various anti-detection techniques – including making use of Google Drive, Google Forms and Twitter.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/new-jhonerat-malware-targets-middle-east/

Read More
  • img January 17, 2020

Feds Cut Off Access to Billions of Breached Records with Site Takedown

This post was originally published on this siteThe WeLeakInfo “data breach notification” domain is no more.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/feds-cut-off-access-to-billions-of-breached-records-with-site-takedown/

Read More
  • img January 17, 2020

Mobile Carrier Customer Service Ushers in SIM-Swap Fraud

This post was originally published on this siteWeak challenge questions by customer service reps make it easy for fraudsters to hijack a phone line and bypass 2FA to breach accounts.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/mobile-carrier-customer-service-ushers-in-sim-swap-fraud/

Read More
  • img January 17, 2020

Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea?

This post was originally published on this siteAre publicly released proof-of-concept exploits more helpful for system defenders — or bad actors?   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/threatpost-poll-are-published-poc-exploits-a-good-or-bad-idea/

Read More
  • img January 17, 2020

News Wrap: PoC Exploits, Cable Haunt and Joker Malware

This post was originally published on this siteAre publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week’s news wrap.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/news-wrap-poc-exploits-cable-haunt-and-joker-malware/

Read More