Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls.
Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continue to rely on older attack methods that are working. Learn more about this latest attack and how attackers are raising the bar during this week's Threatpost podcast.
Databases Pockmarked With an Average of 26 Vulnerabilities Globally – Podcast
What Ragnar Locker Got Wrong About Ransomware Negotiators – Podcast
Verizon DBIR Marries MITRE ATT&CK – Podcast
‘Pay Ransom’ Screen=Too Late, Humpty Dumpty – Podcast
Podcast: Ransomware Up x10; Telecoms Uber Walloped
What’s Next for T-Mobile and Its Customers? – Podcast
SolarWinds 2.0 Could Set Off the Next Financial Crisis – Podcast
Fuzz Off: How to Shake Up Code to Get It Right – Podcast
We COVID-Clicked on Garbage, Report Finds: Podcast
‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics
Podcast: Why Securing Microsoft Active Directory Is Such a Nightmare
IoT Piranhas Are Swarming Industrial Controls
What’s Next for REvil’s Victims?
Protecting Phones From Pegasus-Like Spyware Attacks
What’s Making You a Ransomware Sitting Duck
SASE & Zero Trust: The Dream Team
Insider Risks In the Work-From-Home World
The State of Ransomware with Fortiguard's Derek Manky
Effective Adoption of SASE in 2021
Why and How Cybercrooks Milk Exploits in Underground Markets
Create your
podcast in
minutes
It is Free
WSJ Tech News Briefing
gm! crypto
CyberWire Daily
Cyber Security Headlines
The WAN Show