• img October 28, 2020

‘Copyright Violation’ Notices Lead to Facebook 2FA Bypass

This post was originally published on this siteFraudulent Facebook messages allege copyright infringement and threaten to take down pages, unless users enter logins, passwords and 2FA codes.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/copyright-violation-notices-lead-to-facebook-2fa-bypass/

Read More
  • img October 28, 2020

How the Pandemic is Reshaping the Bug-Bounty Landscape

This post was originally published on this siteBugcrowd Founder Casey Ellis talks about COVID-19’s impact on bug bounty hunters, bug bounty program adoption and more.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/how-the-pandemic-is-reshaping-the-bug-bounty-landscape/

Read More
  • img October 28, 2020

Russian Espionage Group Updates Custom Malware Suite

This post was originally published on this siteTurla has outfitted a trio of backdoors with new C2 tricks and increased interop, as seen in an attack on a European government.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/russian-espionage-group-updates-custom-malware-suite/

Read More
  • img October 28, 2020

Iran-linked APT Targets T20 Summit, Munich Security Conference Attendees

This post was originally published on this siteThe Phosphorous APT has launched successful attacks against world leaders who are attending the Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia, Microsoft warns.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/iran-linked-apt-targets-t20-summit-munich-security-conference-attendees/

Read More
  • img October 28, 2020

Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote

This post was originally published on this siteWith the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/election-security-how-mobile-devices-are-shaping-the-way-we-work-play-and-vote/

Read More