Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

infosec

  • Home
  • infosec
  • Page 1,161
From Krebs on Security – Why is .US Being Used to Phish So Many of Us?
Posted inResearch

From Krebs on Security – Why is .US Being Used to Phish So Many of Us?

Domain names ending in “.US” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because .US…
Posted by Samir K September 1, 2023
Smashing Security – The DEA’s crypto calamity, and scammers’ blue tick bonanza
Posted inPodcast

Smashing Security – The DEA’s crypto calamity, and scammers’ blue tick bonanza

​Seized cryptocurrency is stolen from the DEA, blue-ticks are being exploited, a bath full of dollar bills, the comfort offered by an ostrich's head, and how Graham is refusing to…
Posted by Samir K August 30, 2023
Smashing Security – Pizza pests, and securing your wearables
Posted inPodcast

Smashing Security – Pizza pests, and securing your wearables

​Surely you should be able to order pizza without being pestered for sex? And Carole takes a look at the what and why of wearables...All this and more is discussed…
Posted by Samir K August 23, 2023
From Cybersecurity Help – List of vendors and software affected by the Apache Log4J vulnerability (CVE-2021-44228) (Updated)
Posted inVulnerabilities

From Cybersecurity Help – List of vendors and software affected by the Apache Log4J vulnerability (CVE-2021-44228) (Updated)

On this page we display a list of vendors and their software affected by the code injection vulnerability in the Apache Log4J. This page is being updated in real time…
Posted by Samir K August 22, 2023
Smashing Security – AI chat wars, and hacker passwords exposed
Posted inPodcast

Smashing Security – AI chat wars, and hacker passwords exposed

​AI chatbots are under fire in Las Vegas, the secrets of hackers' passwords are put under the microscope, and Graham reveals (possibly) the greatest TV programme of all time.All this…
Posted by Samir K August 16, 2023
Posted inBreaches

From Cybercrime Magazine – Global Penetration Testing Market To Exceed $5 Billion USD Annually By 2031

25 Ethical Hacking Facts, Figures, Predictions, and Statistics. Sponsored by BreachLock – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Aug. 14, 2023 “If you’re spending one dollar on cybersecurity and you’re…
Posted by Samir K August 14, 2023
Posted inNews

From Cybercrime Magazine – Black Hat USA 2023: Business Hall Interviews

What happens in Vegas airs on Cybercrime Radio – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Aug. 11, 2023 Cybercrime Radio Host Scott Schober and Cybercrime Magazine media roadie Sam White…
Posted by Samir K August 11, 2023
Smashing Security – Acoustic attacks, and the tears of a crypto rapper
Posted inPodcast

Smashing Security – Acoustic attacks, and the tears of a crypto rapper

​Razzlekhan, the self-proclaimed Crocodile of Wall Street, pleads guilty to the biggest crypto laundering scheme in history, and just how safe are you typing while on a Zoom call?Meanwhile, Graham…
Posted by Samir K August 9, 2023
Smashing Security – Barbie and the stalking spouse
Posted inPodcast

Smashing Security – Barbie and the stalking spouse

​Carole takes us into the sinister side of Barbie, while Graham describes a stalkerware operation that has been spilling its secrets.All this and more is discussed in the latest edition…
Posted by Samir K August 2, 2023
Darknet Diaries – 136: Team Xecuter
Posted inToolkit

Darknet Diaries – 136: Team Xecuter

Team Xecuter was a group involved with making and selling modchips for video game systems. They often made mods that allowed the video game system to rip games or play…
Posted by Samir K August 1, 2023
Darknet Diaries – 135: The D.R. Incident
Posted inPodcast

Darknet Diaries – 135: The D.R. Incident

Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures that he…
Posted by Samir K July 4, 2023
Posted inLearning

From Security Perspective: Defend Against Phishing Emails: A Comprehensive Guide to Cyber Safety

Introduction In today’s interconnected world, phishing emails have become a prevalent threat to our cybersecurity. These deceptive messages aim to trick individuals into divulging sensitive information or performing harmful actions. In this blog post, we will delve into the world of phishing emails, understanding what …
Posted by Samir K July 1, 2023
Posted inLearning

From Security Perspective: Protecting Yourself from SMS and Call Frauds: A Comprehensive Guide

Introduction In today’s digital age, SMS and call frauds have become prevalent and pose significant risks to individuals and organizations alike. Scammers exploit these communication channels to deceive unsuspecting victims and gain access to personal information or financial resources. This blog post aims to shed …
Posted by Samir K July 1, 2023
Posted inLearning

From Security Perspective: Protect Yourself from UPI Scams: A Comprehensive Guide

Introduction In the digital age, Unified Payments Interface (UPI) has revolutionized the way we transfer money in India. However, with its popularity, UPI scams have also seen a surge. Scammers have become increasingly sophisticated in their tactics, making it crucial for users to be aware …
Posted by Samir K July 1, 2023
Posted inLearning

From Security Perspective: Protect Yourself from WhatsApp Scams: Stay One Step Ahead!

Introduction: In this digital age, communication apps like WhatsApp have become an integral part of our lives. However, with the increased popularity of WhatsApp, scammers have also found new ways to exploit unsuspecting users. In this blog post, we’ll shed light on WhatsApp scams, their …
Posted by Samir K July 1, 2023

Posts pagination

Previous page 1 … 1,159 1,160 1,161 1,162 Next page

Latest Posts

  • From Schneier on Security – Friday Squid Blogging: Giant Squid Live in the Waters of Western AustraliaMay 9, 2026
  • From Dark Reading – ShinyHunters Claims Second Attack Against InstructureMay 9, 2026
  • From Cyber Security News – New PamDOORa Backdoor Attacking Linux Systems to Steal SSH CredentialsMay 9, 2026
  • From Cyber Security News – Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture CapabilitiesMay 9, 2026
  • From The Hacker News – TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook WormsMay 8, 2026
Total Visitors
1502291

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top