Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls.
Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continue to rely on older attack methods that are working. Learn more about this latest attack and how attackers are raising the bar during this week's Threatpost podcast.
Inside the Hackers’ Toolkit
Being prepared for adversarial attacks
The State of Secrets Sprawl
The Truth Behind ‘Mythical’ MacOS Malware – Podcast
A Blockchain Primer and a Bored Ape Headscratcher – Podcast
Cyberattackers Put the Pedal to the Metal – Podcast
Top 3 Attack Trends in API Security – Podcast
Reporting Mandates to Clear Up Feds' Hazy Look into Threat Landscape – Podcast
Staff Think Conti Group Is a Legit Employer – Podcast
Multi-Ransomwared Victims Have It Coming
Russia Leaks Data From a Thousand Cuts–Podcast
Securing Data With a Frenzied Remote Workforce–Podcast
The Art of Non-boring Cybersec Training–Podcast
Killing Cloud Risk by Bulletproofing App Security: Podcast
Former FBI Gumshoe Nabs Cybercrooks Using Proven Behavioral Clues
How to Buy Precious Patching Time as Log4j Exploits Fly
Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast
Podcast: Could the Zoho Flaw Trigger the Next SolarWinds?
Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once
DDoS Attacks Are a Flourishing Business for Cybercrooks – Podcast
Create your
podcast in
minutes
It is Free
gm! crypto
CyberWire Daily
Babbage from The Economist
Understood
Cyber Security Headlines