• img August 08, 2019

Black Hat 2019: Addressing Supply-Chain Risk Starts with People, Microsoft Says

This post was originally published on this siteLAS VEGAS – Supply-chain attacks have nabbed headlines lately thanks to high-profile incidents like the Wipro news last April, where attackers were able to compromise the staffing agency’s network and pivot to their customers. That incident pointed out that supply-chain risk should be thought of in a much […]

Read More
  • img August 08, 2019

Critical RCE Bug Found Lurking in Avaya VoIP Phones

This post was originally published on this siteThe vulnerability is a decade old with a public exploit, yet remained unpatched in one of the phone giant’s most popular models.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/critical-rce-bug-found-lurking-in-avaya-voip-phones/

Read More
  • img August 08, 2019

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

This post was originally published on this siteResearchers were able to bypass Apple’s FaceID using a pair of glasses with tape on the lenses.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/researchers-bypass-apple-faceid-using-biometrics-achilles-heel/

Read More
  • img August 08, 2019

Ransomware Sees Triple-Digit Spike in Corporate Detections

This post was originally published on this siteA pair of reports released at Black Hat mark the huge shift away from targeting consumers.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/ransomware-sees-triple-digit-spike-in-corporate-detections/

Read More
  • img August 08, 2019

Phishing Attacks Enlist Amazon AWS, Microsoft Azure in Ploys

This post was originally published on this siteAn ongoing campaign is hosting its phishing landing pages on enterprise-class public cloud storage services — a nascent trend meant to throw defenders off.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/phishing-attacks-enlist-amazon-aws-microsoft-azure-in-ploys/

Read More