HoeflerText SocEng Attack Now Targeting Firefox with a Mozilla Font Pack
HoeflerText Font Pack social engineering attack has expanded to now include the Firefox browser as one of its targets. Not paying attention and installing its payload will lead to the Zeus Panda banking Trojan being installed on a victim's computer. [...]
https://www.bleepingcomputer.com/news/security/hoeflertext-soceng-attack-now-targeting-firefox-with-a-mozilla-font-pack/
HoeflerText Font Pack social engineering attack has expanded to now include the Firefox browser as one of its targets. Not paying attention and installing its payload will lead to the Zeus Panda banking Trojan being installed on a victim's computer. [...]
https://www.bleepingcomputer.com/news/security/hoeflertext-soceng-attack-now-targeting-firefox-with-a-mozilla-font-pack/
BleepingComputer
HoeflerText SocEng Attack Now Targeting Firefox with a Mozilla Font Pack
HoeflerText Font Pack social engineering attack has expanded to now include the Firefox browser as one of its targets. Not paying attention and installing its payload will lead to the Zeus Panda banking Trojan being installed on a victim's computer.
234 Android Applications Are Currently Using Ultrasonic Beacons to Track Users
A team of researchers from the Brunswick Technical University in Germany has discovered an alarming number of Android applications that employ ultrasonic tracking beacons to track users and their nearby environment. [...]
https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/
A team of researchers from the Brunswick Technical University in Germany has discovered an alarming number of Android applications that employ ultrasonic tracking beacons to track users and their nearby environment. [...]
https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/
BleepingComputer
234 Android Applications Are Currently Using Ultrasonic Beacons to Track Users
A team of researchers from the Brunswick Technical University in Germany has discovered an alarming number of Android applications that employ ultrasonic tracking beacons to track users and their nearby environment.
Malware Targets North Korea for Once
Security researchers from Cisco Talos have come across a new malware family that was used to target various officials and organizations linked to North Korea. [...]
https://www.bleepingcomputer.com/news/security/malware-targets-north-korea-for-once/
Security researchers from Cisco Talos have come across a new malware family that was used to target various officials and organizations linked to North Korea. [...]
https://www.bleepingcomputer.com/news/security/malware-targets-north-korea-for-once/
BleepingComputer
Malware Targets North Korea for Once
Security researchers from Cisco Talos have come across a new malware family that was used to target various officials and organizations linked to North Korea.
WordPress Zero-Day Could Expose Password Reset Emails
Polish security expert Dawid Golunski has discovered a zero-day in the WordPress password reset mechanism that would allow an attacker to obtain the password reset link, under certain circumstances. [...]
https://www.bleepingcomputer.com/news/security/wordpress-zero-day-could-expose-password-reset-emails/
Polish security expert Dawid Golunski has discovered a zero-day in the WordPress password reset mechanism that would allow an attacker to obtain the password reset link, under certain circumstances. [...]
https://www.bleepingcomputer.com/news/security/wordpress-zero-day-could-expose-password-reset-emails/
BleepingComputer
WordPress Zero-Day Could Expose Password Reset Emails
Polish security expert Dawid Golunski has discovered a zero-day in the WordPress password reset mechanism that would allow an attacker to obtain the password reset link, under certain circumstances.
Some Twitter Dude Is Trying to Take Credit for the Google Docs Phishing Attack
A Twitter user by the name @EugenePupov is trying to take credit for the massive phishing attack that hit Gmail users last night, but currently available evidence isn't lining up with his statements. [...]
https://www.bleepingcomputer.com/news/security/some-twitter-dude-is-trying-to-take-credit-for-the-google-docs-phishing-attack/
A Twitter user by the name @EugenePupov is trying to take credit for the massive phishing attack that hit Gmail users last night, but currently available evidence isn't lining up with his statements. [...]
https://www.bleepingcomputer.com/news/security/some-twitter-dude-is-trying-to-take-credit-for-the-google-docs-phishing-attack/
BleepingComputer
Some Twitter Dude Is Trying to Take Credit for the Google Docs Phishing Attack
A Twitter user by the name @EugenePupov is trying to take credit for the massive phishing attack that hit Gmail users last night, but currently available evidence isn't lining up with his statements.
15K Botnet Mines for Cryptocurrencies on Vulnerable Windows Servers
A malware developer suspected of operating out of China is in control of a botnet of 15,000 compromised Windows Server machines, which he uses to mine for various crypto-currencies, and primarily Monero. [...]
https://www.bleepingcomputer.com/news/security/15k-botnet-mines-for-cryptocurrencies-on-vulnerable-windows-servers/
A malware developer suspected of operating out of China is in control of a botnet of 15,000 compromised Windows Server machines, which he uses to mine for various crypto-currencies, and primarily Monero. [...]
https://www.bleepingcomputer.com/news/security/15k-botnet-mines-for-cryptocurrencies-on-vulnerable-windows-servers/
BleepingComputer
15K Botnet Mines for Cryptocurrencies on Vulnerable Windows Servers
A malware developer suspected of operating out of China is in control of a botnet of 15,000 compromised Windows Server machines, which he uses to mine for various crypto-currencies, and primarily Monero.
Windows 10 Insider Build 16188 For PC Brings Application Guard to the Enterprise
Today Microsoft released Insider Preview Build 16188 for PC and Insider Preview Build 15210 for Mobile to insiders on the fast ring. With build 16188, Microsoft introduces new features in Microsoft Edge's PDF Reader and Application Guard for Microsoft Edge. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16188-for-pc-brings-application-guard-to-the-enterprise/
Today Microsoft released Insider Preview Build 16188 for PC and Insider Preview Build 15210 for Mobile to insiders on the fast ring. With build 16188, Microsoft introduces new features in Microsoft Edge's PDF Reader and Application Guard for Microsoft Edge. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16188-for-pc-brings-application-guard-to-the-enterprise/
BleepingComputer
Windows 10 Insider Build 16188 For PC Brings Application Guard to the Enterprise
Today Microsoft released Insider Preview Build 16188 for PC and Insider Preview Build 15210 for Mobile to insiders on the fast ring. With build 16188, Microsoft introduces new features in Microsoft Edge's PDF Reader and Application Guard for Microsoft Edge.
Hackers Use Flaws in Telephony Core Protocol to Bypass 2FA on Bank Accounts
Hackers have exploited decades-old flaws in the SS7 mobile telephony protocol to hijack phone numbers and SMS messages, in order to bypass two-factor authentication (2FA) and steal money from bank accounts. [...]
https://www.bleepingcomputer.com/news/security/hackers-use-flaws-in-telephony-core-protocol-to-bypass-2fa-on-bank-accounts/
Hackers have exploited decades-old flaws in the SS7 mobile telephony protocol to hijack phone numbers and SMS messages, in order to bypass two-factor authentication (2FA) and steal money from bank accounts. [...]
https://www.bleepingcomputer.com/news/security/hackers-use-flaws-in-telephony-core-protocol-to-bypass-2fa-on-bank-accounts/
BleepingComputer
Hackers Use Flaws in Telephony Core Protocol to Bypass 2FA on Bank Accounts
Hackers have exploited decades-old flaws in the SS7 mobile telephony protocol to hijack phone numbers and SMS messages, in order to bypass two-factor authentication (2FA) and steal money from bank accounts.
New Fatboy Ransomware-as-a-Service Advertised on Russian Hacking Forum
A new Ransomware-as-a-Service (RaaS) portal is being advertised on an underground hacking forum, primarily used by Russian-speaking criminals. [...]
https://www.bleepingcomputer.com/news/security/new-fatboy-ransomware-as-a-service-advertised-on-russian-hacking-forum/
A new Ransomware-as-a-Service (RaaS) portal is being advertised on an underground hacking forum, primarily used by Russian-speaking criminals. [...]
https://www.bleepingcomputer.com/news/security/new-fatboy-ransomware-as-a-service-advertised-on-russian-hacking-forum/
BleepingComputer
New Fatboy Ransomware-as-a-Service Advertised on Russian Hacking Forum
A new Ransomware-as-a-Service (RaaS) portal is being advertised on an underground hacking forum, primarily used by Russian-speaking criminals.
Cyber-Espionage Malware Is So Advanced It Has Its Own API
Russian cyberspies have developed a new breed of backdoor trojan that features several novel techniques, including an API that allows attackers to reverse the C&C communications flow when needed. [...]
https://www.bleepingcomputer.com/news/security/cyber-espionage-malware-is-so-advanced-it-has-its-own-api/
Russian cyberspies have developed a new breed of backdoor trojan that features several novel techniques, including an API that allows attackers to reverse the C&C communications flow when needed. [...]
https://www.bleepingcomputer.com/news/security/cyber-espionage-malware-is-so-advanced-it-has-its-own-api/
BleepingComputer
Cyber-Espionage Malware Is So Advanced It Has Its Own API
Russian cyberspies have developed a new breed of backdoor trojan that features several novel techniques, including an API that allows attackers to reverse the C&C communications flow when needed.
Dark Web Marketplace Shut Down in Slovakia
Law enforcement in Slovakia has arrested two individuals for their involvement in drugs and weapons trafficking, among which, one is suspected of operating the Dark Web marketplace known as Bloomsfield. [...]
https://www.bleepingcomputer.com/news/security/dark-web-marketplace-shut-down-in-slovakia/
Law enforcement in Slovakia has arrested two individuals for their involvement in drugs and weapons trafficking, among which, one is suspected of operating the Dark Web marketplace known as Bloomsfield. [...]
https://www.bleepingcomputer.com/news/security/dark-web-marketplace-shut-down-in-slovakia/
BleepingComputer
Dark Web Marketplace Shut Down in Slovakia
Law enforcement in Slovakia has arrested two individuals for their involvement in drugs and weapons trafficking, among which, one is suspected of operating the Dark Web marketplace known as Bloomsfield.
US Government Leaves Predator Drone Video Feeds Exposed Online
Two servers located at 216.58.228.18 and 98.188.203.187 have been leaking live video feeds from two Predator drones belonging to the US government. [...]
https://www.bleepingcomputer.com/news/government/us-government-leaves-predator-drone-video-feeds-exposed-online/
Two servers located at 216.58.228.18 and 98.188.203.187 have been leaking live video feeds from two Predator drones belonging to the US government. [...]
https://www.bleepingcomputer.com/news/government/us-government-leaves-predator-drone-video-feeds-exposed-online/
BleepingComputer
US Government Leaves Predator Drone Video Feeds Exposed Online
Two servers located at 216.58.228.18 and 98.188.203.187 have been leaking live video feeds from two Predator drones belonging to the US government.
The Week in Ransomware - May 5th 2017 - Wallet, GlobeImposter, and Cerber
Wow! What a brutal week. This week we have 37 ransomware stories, with 10 of them being on May 1st alone. Most of the new ransomware releases continue to be real crap, but together they add up to a wave of garbage that can do some serious harm. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-5th-2017-wallet-globeimposter-and-cerber/
Wow! What a brutal week. This week we have 37 ransomware stories, with 10 of them being on May 1st alone. Most of the new ransomware releases continue to be real crap, but together they add up to a wave of garbage that can do some serious harm. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-5th-2017-wallet-globeimposter-and-cerber/
BleepingComputer
The Week in Ransomware - May 5th 2017 - Wallet, GlobeImposter, and Cerber
Wow! What a brutal week. This week we have 37 ransomware stories, with 10 of them being on May 1st alone. Most of the new ransomware releases continue to be real crap, but together they add up to a wave of garbage that can do some serious harm.
WikiLeaks Dump Reveals CIA Tool for MitM Attacks
WikiLeaks dumped today the documentation of a new supposed CIA hacking tool called Archimedes, which the Agency had used to perform Man-in-the-Middle attacks on local networks. [...]
https://www.bleepingcomputer.com/news/security/wikileaks-dump-reveals-cia-tool-for-mitm-attacks/
WikiLeaks dumped today the documentation of a new supposed CIA hacking tool called Archimedes, which the Agency had used to perform Man-in-the-Middle attacks on local networks. [...]
https://www.bleepingcomputer.com/news/security/wikileaks-dump-reveals-cia-tool-for-mitm-attacks/
BleepingComputer
WikiLeaks Dump Reveals CIA Tool for MitM Attacks
WikiLeaks dumped today the documentation of a new supposed CIA hacking tool called Archimedes, which the Agency had used to perform Man-in-the-Middle attacks on local networks.
FrozrLock Ransomware Advertised on the Dark Web As "Great Security Tool"
A new Ransomware-as-a-Service has become available on the Dark Web, named FrozrLock, available for only $220, and advertised under the tagline of "great security tool that encrypts most of your files in several minutes." [...]
https://www.bleepingcomputer.com/news/security/frozrlock-ransomware-advertised-on-the-dark-web-as-great-security-tool-/
A new Ransomware-as-a-Service has become available on the Dark Web, named FrozrLock, available for only $220, and advertised under the tagline of "great security tool that encrypts most of your files in several minutes." [...]
https://www.bleepingcomputer.com/news/security/frozrlock-ransomware-advertised-on-the-dark-web-as-great-security-tool-/
BleepingComputer
FrozrLock Ransomware Advertised on the Dark Web As "Great Security Tool"
A new Ransomware-as-a-Service has become available on the Dark Web, named FrozrLock, available for only $220, and advertised under the tagline of "great security tool that encrypts most of your files in several minutes."
Website of HandBrake App Hacked to Spread Proton RAT for Mac Users
The website of the HandBrake app has been compromised, and one of its download mirrors modified to host a version of the Proton RAT embedded in the app's Mac client. [...]
https://www.bleepingcomputer.com/news/security/website-of-handbrake-app-hacked-to-spread-proton-rat-for-mac-users/
The website of the HandBrake app has been compromised, and one of its download mirrors modified to host a version of the Proton RAT embedded in the app's Mac client. [...]
https://www.bleepingcomputer.com/news/security/website-of-handbrake-app-hacked-to-spread-proton-rat-for-mac-users/
BleepingComputer
Website of HandBrake App Hacked to Spread Proton RAT for Mac Users
The website of the HandBrake app has been compromised, and one of its download mirrors modified to host a version of the Proton RAT embedded in the app's Mac client.
Researchers Explore Idea of Sabotage via Antivirus Engines
Four researchers from two universities in Germany have devised a method of turning an antivirus engine's malware scanning engine into an attack weapon. [...]
https://www.bleepingcomputer.com/news/security/researchers-explore-idea-of-sabotage-via-antivirus-engines/
Four researchers from two universities in Germany have devised a method of turning an antivirus engine's malware scanning engine into an attack weapon. [...]
https://www.bleepingcomputer.com/news/security/researchers-explore-idea-of-sabotage-via-antivirus-engines/
BleepingComputer
Researchers Explore Idea of Sabotage via Antivirus Engines
Four researchers from two universities in Germany have devised a method of turning an antivirus engine's malware scanning engine into an attack weapon.
Google Researchers Find Wormable "Crazy Bad" Windows Exploit
Two Google security experts have found a severe remote code execution (RCE) bug in the Windows OS, which they've described as "crazy bad." [...]
https://www.bleepingcomputer.com/news/security/google-researchers-find-wormable-crazy-bad-windows-exploit/
Two Google security experts have found a severe remote code execution (RCE) bug in the Windows OS, which they've described as "crazy bad." [...]
https://www.bleepingcomputer.com/news/security/google-researchers-find-wormable-crazy-bad-windows-exploit/
BleepingComputer
Google Researchers Find Wormable "Crazy Bad" Windows Exploit
Two Google security experts have found a severe remote code execution (RCE) bug in the Windows OS, which they've described as "crazy bad."
Dangerous Microsoft Edge Bug Displays One Set of Numbers, but Prints Another
In one of the weirdest β but equally dangerous β bugs of all time, it appears that Edge will display one set of numbers on the screen, but will send another set of numbers to the printer, effectively replacing content on your documents. [...]
https://www.bleepingcomputer.com/news/microsoft/dangerous-microsoft-edge-bug-displays-one-set-of-numbers-but-prints-another/
In one of the weirdest β but equally dangerous β bugs of all time, it appears that Edge will display one set of numbers on the screen, but will send another set of numbers to the printer, effectively replacing content on your documents. [...]
https://www.bleepingcomputer.com/news/microsoft/dangerous-microsoft-edge-bug-displays-one-set-of-numbers-but-prints-another/
BleepingComputer
Dangerous Microsoft Edge Bug Displays One Set of Numbers, but Prints Another
In one of the weirdest β but equally dangerous β bugs of all time, it appears that Edge will display one set of numbers on the screen, but will send another set of numbers to the printer, effectively replacing content on your documents.
Emsisoft Releases a Decryptor for the Amnesia Ransomware
On Satruday, Emsisoft's CTO and malware researcher Fabian Wosar released a decryptor for the Amnesia Ransomware. This ransomware was first spotted in early May and has had one other variant released. It was named Amnesia based on the extension appended to encrypted files by the first variant. [...]
https://www.bleepingcomputer.com/news/security/emsisoft-releases-a-decryptor-for-the-amnesia-ransomware/
On Satruday, Emsisoft's CTO and malware researcher Fabian Wosar released a decryptor for the Amnesia Ransomware. This ransomware was first spotted in early May and has had one other variant released. It was named Amnesia based on the extension appended to encrypted files by the first variant. [...]
https://www.bleepingcomputer.com/news/security/emsisoft-releases-a-decryptor-for-the-amnesia-ransomware/
BleepingComputer
Emsisoft Releases a Decryptor for the Amnesia Ransomware
On Satruday, Emsisoft's CTO and malware researcher Fabian Wosar released a decryptor for the Amnesia Ransomware. This ransomware was first spotted in early May and has had one other variant released. It was named Amnesia based on the extension appended toβ¦
News Brief: BitKangoroo Ransomware Deletes Your Files If You Do not Pay
In our first ransomware in brief article, we are taking a look at a new in-development ransomware called BitKangoroo that I discovered today. Yes, I know, skidz can't spell. This particular ransomware is developer by a real scumbag who intends to delete a victims files if they do not pay fast enough. [...]
https://www.bleepingcomputer.com/news/security/news-brief-bitkangoroo-ransomware-deletes-your-files-if-you-do-not-pay/
In our first ransomware in brief article, we are taking a look at a new in-development ransomware called BitKangoroo that I discovered today. Yes, I know, skidz can't spell. This particular ransomware is developer by a real scumbag who intends to delete a victims files if they do not pay fast enough. [...]
https://www.bleepingcomputer.com/news/security/news-brief-bitkangoroo-ransomware-deletes-your-files-if-you-do-not-pay/
BleepingComputer
News Brief: BitKangoroo Ransomware Deletes Your Files If You Do not Pay
In our first ransomware in brief article, we are taking a look at a new in-development ransomware called BitKangoroo that I discovered today. Yes, I know, skidz can't spell. This particular ransomware is developer by a real scumbag who intends to delete aβ¦