Top Next-Gen Security Firm Leaking Terabytes of Customer Data
Sensitive corporate data from customers protected by Carbon Black endpoint detection and response (EDR) solutions has been found on multiscanner services, according to an investigation by DirectDefense, a provider of managed security strategies. [...]
https://www.bleepingcomputer.com/news/security/top-next-gen-security-firm-leaking-terabytes-of-customer-data/
Sensitive corporate data from customers protected by Carbon Black endpoint detection and response (EDR) solutions has been found on multiscanner services, according to an investigation by DirectDefense, a provider of managed security strategies. [...]
https://www.bleepingcomputer.com/news/security/top-next-gen-security-firm-leaking-terabytes-of-customer-data/
BleepingComputer
Top Next-Gen Security Firm Accused of Leaking Terabytes of Customer Data
Sensitive corporate data from customers protected by Carbon Black endpoint detection and response (EDR) solutions has been found on multiscanner services, according to an investigation by DirectDefense, a provider of managed security strategies.
FBI Used Booby-Trapped Video to Catch Suspected Sextortionist Hiding Behind Tor
On Monday, US authorities announced the arrest of a suspect who used Tor to disguise his online identity and coerce underage female victims into sending sexually explicit images and videos in a tactic commonly referred to as "sextortion." [...]
https://www.bleepingcomputer.com/news/security/fbi-used-booby-trapped-video-to-catch-suspected-sextortionist-hiding-behind-tor/
On Monday, US authorities announced the arrest of a suspect who used Tor to disguise his online identity and coerce underage female victims into sending sexually explicit images and videos in a tactic commonly referred to as "sextortion." [...]
https://www.bleepingcomputer.com/news/security/fbi-used-booby-trapped-video-to-catch-suspected-sextortionist-hiding-behind-tor/
BleepingComputer
FBI Used Booby-Trapped Video to Catch Suspected Sextortionist Hiding Behind Tor
On Monday, US authorities announced the arrest of a suspect who used Tor to disguise his online identity and coerce underage female victims into sending sexually explicit images and videos in a tactic commonly referred to as "sextortion."
UK Law Proposal to Criminalize Re-Identification of Anonymized User Data
British lawmakers have filed on Monday a statement of intent regarding proposals for improvements to the Data Protection Act, with a focus on criminalizing anonymous data re-identification, imposing larger fines for cyber incidents, and more user protections for British online netizens. [...]
https://www.bleepingcomputer.com/news/government/uk-law-proposal-to-criminalize-re-identification-of-anonymized-user-data/
British lawmakers have filed on Monday a statement of intent regarding proposals for improvements to the Data Protection Act, with a focus on criminalizing anonymous data re-identification, imposing larger fines for cyber incidents, and more user protections for British online netizens. [...]
https://www.bleepingcomputer.com/news/government/uk-law-proposal-to-criminalize-re-identification-of-anonymized-user-data/
BleepingComputer
UK Law Proposal to Criminalize Re-Identification of Anonymized User Data
British lawmakers have filed on Monday a statement of intent regarding proposals for improvements to the Data Protection Act, with a focus on criminalizing anonymous data re-identification, imposing larger fines for cyber incidents, and more user protectionsβ¦
Locky Ransomware Returns with Spam Campaign Pushing Diablo6 Variant
A large malspam campaign is underway that is pushing a new Locky variant that appends the .diablo6 extension to encrypted files. Is this the return of Locky or just a brief resurgence? [...]
https://www.bleepingcomputer.com/news/security/locky-ransomware-returns-with-spam-campaign-pushing-diablo6-variant/
A large malspam campaign is underway that is pushing a new Locky variant that appends the .diablo6 extension to encrypted files. Is this the return of Locky or just a brief resurgence? [...]
https://www.bleepingcomputer.com/news/security/locky-ransomware-returns-with-spam-campaign-pushing-diablo6-variant/
BleepingComputer
Locky Ransomware Returns with Spam Campaign Pushing Diablo6 Variant
A large malspam campaign is underway that is pushing a new Locky variant that appends the .diablo6 extension to encrypted files. Is this the return of Locky or just a brief resurgence?
Owners of vDos, Largest DDoS-For-Hire Service, Officially Charged in Israel
Israeli authorities have officially charged two 19-year-old teenagers for running vDos, a DDoS-for-hire service, the largest such platform at the time it went down in the autumn of last year. [...]
https://www.bleepingcomputer.com/news/security/owners-of-vdos-largest-ddos-for-hire-service-officially-charged-in-israel/
Israeli authorities have officially charged two 19-year-old teenagers for running vDos, a DDoS-for-hire service, the largest such platform at the time it went down in the autumn of last year. [...]
https://www.bleepingcomputer.com/news/security/owners-of-vdos-largest-ddos-for-hire-service-officially-charged-in-israel/
BleepingComputer
Owners of vDos, Largest DDoS-For-Hire Service, Officially Charged in Israel
Israeli authorities have officially charged two 19-year-old teenagers for running vDos, a DDoS-for-hire service, the largest such platform at the time it went down in the autumn of last year.
Microsoft: 71% of Windows 10 Creators Update PCs Use Full Telemetry Settings
Marisa Rogers, privacy officers for Microsoft's Windows and Devices Group, says that 71% of the users who updated to the Windows 10 Creators Update in the past months have chosen to enable the "Full" diagnostics and telemetry collection settings during the upgrade process. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-71-percent-of-windows-10-creators-update-pcs-use-full-telemetry-settings/
Marisa Rogers, privacy officers for Microsoft's Windows and Devices Group, says that 71% of the users who updated to the Windows 10 Creators Update in the past months have chosen to enable the "Full" diagnostics and telemetry collection settings during the upgrade process. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-71-percent-of-windows-10-creators-update-pcs-use-full-telemetry-settings/
BleepingComputer
Microsoft: 71% of Windows 10 Creators Update PCs Use Full Telemetry Settings
Marisa Rogers, privacy officers for Microsoft's Windows and Devices Group, says that 71% of the users who updated to the Windows 10 Creators Update in the past months have chosen to enable the "Full" diagnostics and telemetry collection settings during theβ¦
HackinItaly: The Story Behind the Takedown of a 2,500-Strong QNAP NAS Botnet
Last Friday, on August 4, a jury in the US found Fabio Gasperini, an Italian citizen, guilty of building a botnet that he used to hijack remote servers and surreptitiously click on ads for his personal profits. [...]
https://www.bleepingcomputer.com/news/security/hackinitaly-the-story-behind-the-takedown-of-a-2-500-strong-qnap-nas-botnet/
Last Friday, on August 4, a jury in the US found Fabio Gasperini, an Italian citizen, guilty of building a botnet that he used to hijack remote servers and surreptitiously click on ads for his personal profits. [...]
https://www.bleepingcomputer.com/news/security/hackinitaly-the-story-behind-the-takedown-of-a-2-500-strong-qnap-nas-botnet/
BleepingComputer
HackinItaly: The Story Behind the Takedown of a 2,500-Strong QNAP NAS Botnet
Last Friday, on August 4, a jury in the US found Fabio Gasperini, an Italian citizen, guilty of building a botnet that he used to hijack remote servers and surreptitiously click on ads for his personal profits.
New Mac Adware Mughthesec Will Cause Serious Headaches
A new family of Mac adware is bound to cause some headaches to infected victims, as the only way to remove it and its secondary payloads is by reinstalling macOS from scratch, according to the expert opinion of Patrick Wardle, Director of Research at Synack and a well-known Mac malware researcher. [...]
https://www.bleepingcomputer.com/news/security/new-mac-adware-mughthesec-will-cause-serious-headaches/
A new family of Mac adware is bound to cause some headaches to infected victims, as the only way to remove it and its secondary payloads is by reinstalling macOS from scratch, according to the expert opinion of Patrick Wardle, Director of Research at Synack and a well-known Mac malware researcher. [...]
https://www.bleepingcomputer.com/news/security/new-mac-adware-mughthesec-will-cause-serious-headaches/
BleepingComputer
New Mac Adware Mughthesec Will Cause Serious Headaches
A new family of Mac adware is bound to cause some headaches to infected victims, as the only way to remove it and its secondary payloads is by reinstalling macOS from scratch, according to the expert opinion of Patrick Wardle, Director of Research at Synackβ¦
Vault 7: Wikileaks Divulges CIA Tool for Capturing RTSP and H.264 Video Streams
Wikileaks published today a manual for an alleged CIA tool that can capture the content of remote video streams and save them to disk for further analysis. [...]
https://www.bleepingcomputer.com/news/security/vault-7-wikileaks-divulges-cia-tool-for-capturing-rtsp-and-h-264-video-streams/
Wikileaks published today a manual for an alleged CIA tool that can capture the content of remote video streams and save them to disk for further analysis. [...]
https://www.bleepingcomputer.com/news/security/vault-7-wikileaks-divulges-cia-tool-for-capturing-rtsp-and-h-264-video-streams/
BleepingComputer
Vault 7: Wikileaks Divulges CIA Tool for Capturing RTSP and H.264 Video Streams
Wikileaks published today a manual for an alleged CIA tool that can capture the content of remote video streams and save them to disk for further analysis.
IsraBye is a Anti-Israel Data Wiper Disguised as Ransomware
An anti-Israel & pro-Palestinian data wiper called IsraBye has been discovered that pretends to be a ransomware. Unfortunately, even though the lock screen implies that the files can be recovered, the contents of the files are actually replaced with an anti-Israel message. [...]
https://www.bleepingcomputer.com/news/security/israbye-is-a-anti-israel-data-wiper-disguised-as-ransomware/
An anti-Israel & pro-Palestinian data wiper called IsraBye has been discovered that pretends to be a ransomware. Unfortunately, even though the lock screen implies that the files can be recovered, the contents of the files are actually replaced with an anti-Israel message. [...]
https://www.bleepingcomputer.com/news/security/israbye-is-a-anti-israel-data-wiper-disguised-as-ransomware/
BleepingComputer
IsraBye is a Anti-Israel Data Wiper Disguised as Ransomware
An anti-Israel & pro-Palestinian data wiper called IsraBye has been discovered that pretends to be a ransomware. Unfortunately, even though the lock screen implies that the files can be recovered, the contents of the files are actually replaced with an antiβ¦
Microsoft Unveils Windows 10 Pro for Workstations
Today, Microsoft unveiled Windows 10 Pro for Workstations, which contains high end features geared towards servers that are running mission critical applications or utilizing high end hardware. These features include ReFS (Resilient file system), persistent memory, faster file sharing, and expanded hardware support. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-windows-10-pro-for-workstations/
Today, Microsoft unveiled Windows 10 Pro for Workstations, which contains high end features geared towards servers that are running mission critical applications or utilizing high end hardware. These features include ReFS (Resilient file system), persistent memory, faster file sharing, and expanded hardware support. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-windows-10-pro-for-workstations/
BleepingComputer
Microsoft Unveils Windows 10 Pro for Workstations
Today, Microsoft unveiled Windows 10 Pro for Workstations, which contains high end features geared towards servers that are running mission critical applications or utilizing high end hardware. These features include ReFS (Resilient file system), persistentβ¦
HBO Wanted to Disguise $250,000 Ransom Payment as Bug Bounty Reward
The hackers who breached HBO's servers have declined a ransom payment of $250,000 from a top HBO exec, according to an email leaked by hackers to the press. [...]
https://www.bleepingcomputer.com/news/security/hbo-wanted-to-disguise-250-000-ransom-payment-as-bug-bounty-reward/
The hackers who breached HBO's servers have declined a ransom payment of $250,000 from a top HBO exec, according to an email leaked by hackers to the press. [...]
https://www.bleepingcomputer.com/news/security/hbo-wanted-to-disguise-250-000-ransom-payment-as-bug-bounty-reward/
BleepingComputer
HBO Wanted to Disguise $250,000 Ransom Payment as Bug Bounty Reward
The hackers who breached HBO's servers have declined a ransom payment of $250,000 from a top HBO exec, according to an email leaked by hackers to the press.
Recently Patched Flash Bug Can Leak Windows Credentials
Earlier this week, Adobe patched a vulnerability in Flash Player that allows an attacker to use malicious Flash files to leak Windows credentials. [...]
https://www.bleepingcomputer.com/news/security/recently-patched-flash-bug-can-leak-windows-credentials/
Earlier this week, Adobe patched a vulnerability in Flash Player that allows an attacker to use malicious Flash files to leak Windows credentials. [...]
https://www.bleepingcomputer.com/news/security/recently-patched-flash-bug-can-leak-windows-credentials/
BleepingComputer
Recently Patched Flash Bug Can Leak Windows Credentials
Earlier this week, Adobe patched a vulnerability in Flash Player that allows an attacker to use malicious Flash files to leak Windows credentials.
Ukraine Police Arrest Man for Spreading NotPetya Ransomware in Tax Evasion Scheme
Ukrainian authorities have arrested a 51-year-old man from Nikopol, Dnipropetrovsk region, on accusations of distributing a version of the NotPetya ransomware. [...]
https://www.bleepingcomputer.com/news/security/ukraine-police-arrest-man-for-spreading-notpetya-ransomware-in-tax-evasion-scheme/
Ukrainian authorities have arrested a 51-year-old man from Nikopol, Dnipropetrovsk region, on accusations of distributing a version of the NotPetya ransomware. [...]
https://www.bleepingcomputer.com/news/security/ukraine-police-arrest-man-for-spreading-notpetya-ransomware-in-tax-evasion-scheme/
BleepingComputer
Ukraine Police Arrest Man for Spreading NotPetya Ransomware in Tax Evasion Scheme
Ukrainian authorities have arrested a 51-year-old man from Nikopol, Dnipropetrovsk region, on accusations of distributing a version of the NotPetya ransomware.
Kaspersky and Microsoft Kiss and Make Up in Antitrust Dispute
Kaspersky Lab and Microsoft simultaneously announced that they've reached common ground on an antitrust complaint the antivirus vendor filed with Russian and European authorities in late 2016 and mid-2017, respectively. [...]
https://www.bleepingcomputer.com/news/microsoft/kaspersky-and-microsoft-kiss-and-make-up-in-antitrust-dispute/
Kaspersky Lab and Microsoft simultaneously announced that they've reached common ground on an antitrust complaint the antivirus vendor filed with Russian and European authorities in late 2016 and mid-2017, respectively. [...]
https://www.bleepingcomputer.com/news/microsoft/kaspersky-and-microsoft-kiss-and-make-up-in-antitrust-dispute/
BleepingComputer
Kaspersky and Microsoft Kiss and Make Up in Antitrust Dispute
Kaspersky Lab and Microsoft simultaneously announced that they've reached common ground on an antitrust complaint the antivirus vendor filed with Russian and European authorities in late 2016 and mid-2017, respectively.
Source Code Management Tools Affected by Severe Vulnerability
Three of the most popular version control systems (VCSs) used in managing source code projects are vulnerable to a flaw that allows an attacker to run code on a victim's platform, potentially leading to the theft of source code or the hijacking of the underlying machine. [...]
https://www.bleepingcomputer.com/news/security/source-code-management-tools-affected-by-severe-vulnerability/
Three of the most popular version control systems (VCSs) used in managing source code projects are vulnerable to a flaw that allows an attacker to run code on a victim's platform, potentially leading to the theft of source code or the hijacking of the underlying machine. [...]
https://www.bleepingcomputer.com/news/security/source-code-management-tools-affected-by-severe-vulnerability/
BleepingComputer
Source Code Management Tools Affected by Severe Vulnerability
Three of the most popular version control systems (VCSs) used in managing source code projects are vulnerable to a flaw that allows an attacker to run code on a victim's platform, potentially leading to the theft of source code or the hijacking of the underlyingβ¦
Russian Cyberspies Are Using NSA Tools to Target European Hotels
After the US government has spent probably millions of dollars developing hacking tools, Russian hackers are now using them to spy on guests across hotels in Europe and the Middle East. [...]
https://www.bleepingcomputer.com/news/security/russian-cyberspies-are-using-nsa-tools-to-target-european-hotels/
After the US government has spent probably millions of dollars developing hacking tools, Russian hackers are now using them to spy on guests across hotels in Europe and the Middle East. [...]
https://www.bleepingcomputer.com/news/security/russian-cyberspies-are-using-nsa-tools-to-target-european-hotels/
BleepingComputer
Russian Cyberspies Are Using NSA Tools to Target European Hotels
After the US government has spent probably millions of dollars developing hacking tools, Russian hackers are now using them to spy on guests across hotels in Europe and the Middle East.
The Week in Ransomware - August 11th 2017 - GlobeImposter & CryptoMix
This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good thing. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-11th-2017-globeimposter-and-cryptomix/
This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good thing. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-11th-2017-globeimposter-and-cryptomix/
BleepingComputer
The Week in Ransomware - August 11th 2017 - GlobeImposter & CryptoMix
This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good thing.
USB Devices Vulnerable to Crosstalk Data Leaks
Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in Australia. [...]
https://www.bleepingcomputer.com/news/security/usb-devices-vulnerable-to-crosstalk-data-leaks/
Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in Australia. [...]
https://www.bleepingcomputer.com/news/security/usb-devices-vulnerable-to-crosstalk-data-leaks/
BleepingComputer
USB Devices Vulnerable to Crosstalk Data Leaks
Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in Australia.
Spyware Apps Found on Google Play Store
Researchers from mobile security firm Lookout say they found at least three Android apps on the Google Play Store that contained a form of advanced spyware they believe was created by an Iraqi developer. [...]
https://www.bleepingcomputer.com/news/security/spyware-apps-found-on-google-play-store/
Researchers from mobile security firm Lookout say they found at least three Android apps on the Google Play Store that contained a form of advanced spyware they believe was created by an Iraqi developer. [...]
https://www.bleepingcomputer.com/news/security/spyware-apps-found-on-google-play-store/
BleepingComputer
Spyware Apps Found on Google Play Store
Researchers from mobile security firm Lookout say they found at least three Android apps on the Google Play Store that contained a form of advanced spyware they believe was created by an Iraqi developer.
Botched Firmware Update Bricks Hundreds of Smart Door Locks
On Tuesday, August 8, smart locks manufacturer LockState botched an over-the-air firmware update for its WiFi enabled smart locks, causing the devices to lose connectivity to the vendor's servers and the ability to open doors for its users. [...]
https://www.bleepingcomputer.com/news/hardware/botched-firmware-update-bricks-hundreds-of-smart-door-locks/
On Tuesday, August 8, smart locks manufacturer LockState botched an over-the-air firmware update for its WiFi enabled smart locks, causing the devices to lose connectivity to the vendor's servers and the ability to open doors for its users. [...]
https://www.bleepingcomputer.com/news/hardware/botched-firmware-update-bricks-hundreds-of-smart-door-locks/
BleepingComputer
Botched Firmware Update Bricks Hundreds of Smart Door Locks
On Tuesday, August 8, smart locks manufacturer LockState botched an over-the-air firmware update for its WiFi enabled smart locks, causing the devices to lose connectivity to the vendor's servers and the ability to open doors for its users.