iThreat is a next-generation threat intelligence and analytics firm. iThreat is fully GDPR compliant.Built – Augmented – Delivered – Supported
“These devices are being connected because they can often help people through the working day or help manage aspects of their personal life, but they’re also creating additional problems for the corporate network.” #threatintelligence
Coffee machines, cuddly toys and cars: The Internet of Things devices that could put you at risk from hackers | ZDNet
More and more devices are being connected to corporate networks – and in many cases, organisations don't even know they're there. But cyber criminals …
“Quick Response (QR) codes are booming in popularity and hackers are flocking to exploit the trend. Worse, according to a new study, people are mostly ignorant of how QR codes can be easily abused to launch digital attacks.” #threatintelligence
QR Codes Serve Up a Menu of Security Concerns
QR code usage is soaring in the pandemic — but malicious versions aren't something that most people think about.
“PayPal is blocking transactions containing the word ‘tardigrade.’ Others are experiencing the same—frustrations and stalled purchases on their water bear merch.” #threatintelligence
PayPal Is Stalling Cute Tardigrade Merch—and a Notorious Weapons Dealer Is to Blame
"Tardigrade Limited" is why people are seeing errors while ordering their cute water bear ornaments on PayPal.
“According to a paper published today, the Raccoon attack is, at its base, a timing attack, where a malicious third-party measures the time needed to perform known cryptographic operations in order to determine parts of the algorithm.” #threatintelligence
Raccoon attack allows hackers to break TLS encryption 'under certain conditions' | ZDNet
The Raccoon attack is described as "really hard to exploit" and its conditions as "rare."
” For the most part, COVID-19 has exacerbated pre-existing cyber threats, from counter incident response and island hopping to lateral movement and destructive attacks.” #threatintelligence
Cybersecurity after COVID-19: Securing orgs against the new threat landscape – Help Net Security
Given the complex global situation, today's security teams are struggling to keep up. What will cybersecurity after COVID-19 look like?
iThreat employee, Joe Farino, published a blog post today about the domain name abuse challenge for brand executives. #threatintelligence
The Domain Name Abuse Problem for Brand Protection Executives – iThreat
Brand executives need to rapidly detect and execute enforcement actions to combat domain abuse involving their brands.
“The incident describes how someone was able to ‘covertly monitor law enforcement activity while law enforcement was on the premises’ and alert his neighbor and landlord. It does not name the brand of video doorbell used.” #threatintelligence
FBI worried that Ring doorbells are spying on police
Someone under investigation was said to be able to "covertly monitor law enforcement activity".