You might be interested in …

[ThreatPost] Pandemic-Influenced Car Shopping: Just Use the Manufacturer API

All posts, ThreatPost

Jason Kent, hacker-in-residence at Cequence, found a way to exploit a Toyota API to get around the hassle of car shopping in the age of supply-chain woes. Source: Read More (Threatpost)

Read More

[TheRecord] Microsoft uncovers giant Phishing-as-a-Service operation

Microsoft’s security team said today that it uncovered a massive operation that provides phishing services to cybercrime gangs using a hosting-like infrastructure that the OS maker likened to a Phishing-as-a-Service (PHaaS) model. Known as BulletProofLink, BulletProftLink, or Anthrax, the service is currently advertised on underground cybercrime forums. The service is an evolution on “phishing kits,” which […]

Read More

[ESET] Week in security with Tony Anscombe

All posts, ESET feed

ESET research dissects IIS web server threats – How IIStealer steals credit card data – The flood of spam in your inbox The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)

Read More