Hold Security profiles the gang, who is behind the cryptocurrency scam, that likely inspired the Twitter breach and the same scam that prompted Steve Wozniak to sue Alphabet Inc. over ineffective protection.
Hold Security identifies Russian-speaking threat actors abusing critical 0-day vulnerability within Zyxel NAS allowing execute malicious code bypassing system authentication.
We teamed up with Brian Krebs to alert CERT and vendor about the issue. Nearly 2 weeks later, Zyxel finally released a patch for some of their devices that they still support. Emotet gang is weaponizing these exploits to target IoT.
Want to learn more about how the Dark Web works and what all security professionals need to know?
Hold Security discovers hackers photoshopping images to reset 2FA!
Alex Holden, Hold Security’s CISO comments and contributes crucial information to the story.
MEQUON, Wis. – October 3, 2018 Hold Security announced today that Research firm Forrester recently identified and evaluated the 15 most significant providers for External Threat Intelligence, and Hold Security, LLC, ranked as a strong performer in that space. In today’s world, the impact of data security breaches intensifies as for-profit hackers mix with corporate- and state-sponsored hackers, making it paramount for companies to look at emerging cyber threats that are coming from outside of their perimeter.
Hold Security’s discovery of a critical password vulnerability within Equifax Argentina website paints a grim picture of the state of security within Equifax. Brian Krebs covers the details in his article.
How much are you worth to a hacker? Hold Security dove into the black market to put some numbers on it!
Your Biggest Online Security Risk Is You - THE WALL STREET JOURNAL.
Hold Security’s research into hackers selling stolen Yahoo! data is featured on the front page of the New York Times. The timeline of the hackers allegedly obtaining the stolen data. Their claims and goals discussed.
Hold Security identifies a group of hackers behind reported breach of Oracle’s MICROS POS along with nearly a dozen of other smaller POS vendors. Hackers targeted these POS vendors with the goal to gain access to their platform and to their customer installation. The mass abuse of POS devices goes to a new level of exploitation of vendors of POS and their support infrastructures. Forbes Magazine highlights the story.