iThreat is a next-generation threat intelligence and analytics firm. iThreat is fully GDPR compliant.Built – Augmented – Delivered – Supported
“The US Department of State announced today rewards of up to $10 million for any information leading to the identification of any person who works with or for a foreign government to interfere with US elections.” #threatintelligence
US offers $10 million reward for hackers meddling in US elections | ZDNet
This includes attacks against US election officials, election infrastructure, voting machines, but also candidates and their staff.
“A German court has fined and banned a Tesla owner from driving for one month after a crash that happened while the driver was using the car’s built-in touchscreen dashboard to adjust windshield-wiper settings.” #threatintelligence
Tesla owner banned from driving after crash – and it's not over Autopilot | ZDNet
Driver gets a one-month ban for crashing while navigating the windshield-wiper settings on the touchscreen.
“A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses, and passwords of all its customers.”
Krebs on Security
In-depth security news and investigation
“Cybersecurity researchers today disclosed several security issues in popular online dating platform OkCupid that could potentially let attackers remotely spy on users’ private information.” #threatintelligence
OkCupid Dating App Flaws Could've Let Hackers Read Your Private Messages
New vulnerabilities in OkCupid, popular online dating platform, could have let attackers remotely spy on users' private information or perform malicio…
Check out our latest blog!
Vulnerability Assessments, putting a finer point on the risk of insider threats. – iThreat
Some recent data compiled by Mike Gips (principal at Global Insights in Professional Security (GIPS) and formerly of ASIS) his colleague Lou Mizell su…
“Fifteen out of 28 desktop PDF viewer applications are vulnerable to a new attack that lets malicious threat actors modify the content of digitally signed PDF documents.” #threatintelligence
New 'Shadow Attack' can replace content in digitally signed PDF files | ZDNet
15 out of the 28 biggest desktop PDF viewers are vulnerable, German academics say.
“Twitter said hackers accessed its internal systems to hijack some of the platform’s top voices including Joe Biden, Kim Kardashian, Barack Obama, and Elon Musk and used them to solicit digital currency.” #threatintelligence
Twitter silences some top accounts after internal systems hacked
Twitter said hackers accessed its internal systems to hijack some of the platform's top voices including U.S. presidential candidate Joe Biden, realit…
“Certo AntiSpy is a downloadable utility that you can use to scan a backup of your iOS for subtle signs of intrusion.” #threatintelligence
Has your iPhone, iPad, or iPod touch been hacked? Here's how to find out | ZDNet
This utility can carry out a deep scan of your iOS and iPadOS device and let you know if something seems out of place.