Ten Malicious Libraries Found on PyPI - Python Package Index
The Slovak National Security Office (NBU) has identified ten malicious Python libraries uploaded on PyPI — Python Package Index — the official third-party software repository for the Python programming language. [...]
https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/
The Slovak National Security Office (NBU) has identified ten malicious Python libraries uploaded on PyPI — Python Package Index — the official third-party software repository for the Python programming language. [...]
https://www.bleepingcomputer.com/news/security/ten-malicious-libraries-found-on-pypi-python-package-index/
BleepingComputer
Ten Malicious Libraries Found on PyPI - Python Package Index
The Slovak National Security Office (NBU) has identified ten malicious Python libraries uploaded on PyPI — Python Package Index — the official third-party software repository for the Python programming language.
Adware Installs InfoStealer Trojan that it loads via Chrome DLL Hijacking
A password stealing Trojan called AdService is being quietly distributed by adware bundles that typically install other programs such as Russian adware, extensions, clickers, adware, and fake system optimization programs. This Trojan is loaded through DLL hijacking in Chrome. [...]
https://www.bleepingcomputer.com/news/security/adware-installs-infostealer-trojan-that-it-loads-via-chrome-dll-hijacking/
A password stealing Trojan called AdService is being quietly distributed by adware bundles that typically install other programs such as Russian adware, extensions, clickers, adware, and fake system optimization programs. This Trojan is loaded through DLL hijacking in Chrome. [...]
https://www.bleepingcomputer.com/news/security/adware-installs-infostealer-trojan-that-it-loads-via-chrome-dll-hijacking/
BleepingComputer
Adware Installs InfoStealer Trojan That It Loads via Chrome DLL Hijacking
A password stealing Trojan called AdService is being quietly distributed by adware bundles that typically install other programs such as Russian adware, extensions, clickers, adware, and fake system optimization programs. This Trojan is loaded through DLL…
Security.txt Standard Proposed, Similar to Robots.txt
Ed Foudil, a web developer and security researcher, has submitted a draft to the IETF — Internet Engineering Task Force — seeking the standardization of security.txt, a file that webmasters can host on their domain root and describe the site's security policies. [...]
https://www.bleepingcomputer.com/news/security/security-txt-standard-proposed-similar-to-robots-txt/
Ed Foudil, a web developer and security researcher, has submitted a draft to the IETF — Internet Engineering Task Force — seeking the standardization of security.txt, a file that webmasters can host on their domain root and describe the site's security policies. [...]
https://www.bleepingcomputer.com/news/security/security-txt-standard-proposed-similar-to-robots-txt/
BleepingComputer
Security.txt Standard Proposed, Similar to Robots.txt
Ed Foudil, a web developer and security researcher, has submitted a draft to the IETF — Internet Engineering Task Force — seeking the standardization of security.txt, a file that webmasters can host on their domain root and describe the site's security policies.
OurMine Hacks Vevo After Employee Was Disrespectful to Hackers on LinkedIn
Hacking group OurMine has breached Vevo, a video hosting service, and has leaked files from the company's internal network. [...]
https://www.bleepingcomputer.com/news/security/ourmine-hacks-vevo-after-employee-was-disrespectful-to-hackers-on-linkedin/
Hacking group OurMine has breached Vevo, a video hosting service, and has leaked files from the company's internal network. [...]
https://www.bleepingcomputer.com/news/security/ourmine-hacks-vevo-after-employee-was-disrespectful-to-hackers-on-linkedin/
BleepingComputer
OurMine Hacks Vevo After Employee Was Disrespectful to Hackers on LinkedIn
Hacking group OurMine has breached Vevo, a video hosting service, and has leaked files from the company's internal network.
The Week in Ransomware - September 15th 2017 - Mostly In-dev Ransomware
It has been another week of mostly small little in-dev ransomware that will never make it to distribution. In other news, Locky continues to send out large spam campaigns as it tries to become a major player again. Otherwise, not much to report, which we are always happy about. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-15th-2017-mostly-in-dev-ransomware/
It has been another week of mostly small little in-dev ransomware that will never make it to distribution. In other news, Locky continues to send out large spam campaigns as it tries to become a major player again. Otherwise, not much to report, which we are always happy about. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-15th-2017-mostly-in-dev-ransomware/
BleepingComputer
The Week in Ransomware - September 15th 2017 - Mostly In-dev Ransomware
It has been another week of mostly small little in-dev ransomware that will never make it to distribution. In other news, Locky continues to send out large spam campaigns as it tries to become a major player again. Otherwise, not much to report, which we…
Google Will Auto-Delete Android Backups If Users Don't Use Their Phones for 2 Weeks
Google will automatically delete all of a user's Android backup files — stored in his Google Drive account — if the user does not use his phone for two weeks. [...]
https://www.bleepingcomputer.com/news/mobile/google-will-auto-delete-android-backups-if-users-dont-use-their-phones-for-2-weeks/
Google will automatically delete all of a user's Android backup files — stored in his Google Drive account — if the user does not use his phone for two weeks. [...]
https://www.bleepingcomputer.com/news/mobile/google-will-auto-delete-android-backups-if-users-dont-use-their-phones-for-2-weeks/
BleepingComputer
Google Will Auto-Delete Android Backups If Users Don't Use Their Phones for 2 Weeks
Google will automatically delete all of a user's Android backup files — stored in his Google Drive account — if the user does not use his phone for two weeks.
Equifax Releases New Information About Security Breach as Top Execs Step Down
In a press release published late Friday night, credit rating and reporting firm Equifax revealed new details about the security breach that exposed the personal details of over 143 million users, and also announced the immediate retirement of two high-ranking executives. [...]
https://www.bleepingcomputer.com/news/security/equifax-releases-new-information-about-security-breach-as-top-execs-step-down/
In a press release published late Friday night, credit rating and reporting firm Equifax revealed new details about the security breach that exposed the personal details of over 143 million users, and also announced the immediate retirement of two high-ranking executives. [...]
https://www.bleepingcomputer.com/news/security/equifax-releases-new-information-about-security-breach-as-top-execs-step-down/
BleepingComputer
Equifax Releases New Information About Security Breach as Top Execs Step Down
In a press release published late Friday night, credit rating and reporting firm Equifax revealed new details about the security breach that exposed the personal details of over 143 million users, and also announced the immediate retirement of two high-ranking…
The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor
Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security. [...]
https://www.bleepingcomputer.com/news/technology/the-loopix-anonymity-system-wants-to-be-a-more-secure-alternative-to-tor/
Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security. [...]
https://www.bleepingcomputer.com/news/technology/the-loopix-anonymity-system-wants-to-be-a-more-secure-alternative-to-tor/
BleepingComputer
The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor
Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security.
LiteBit Bitcoin Exchange Hacked Twice in Two Months
[...]
https://www.bleepingcomputer.com/news/security/litebit-bitcoin-exchange-hacked-twice-in-two-months/
[...]
https://www.bleepingcomputer.com/news/security/litebit-bitcoin-exchange-hacked-twice-in-two-months/
BleepingComputer
LiteBit Bitcoin Exchange Hacked Twice in Two Months
LiteBit.eu — a multi-currency exchange based in the Netherlands — has suffered data breaches two months in a row. According to emails sent to affected customers after each event, no Bitcoin or altcoin funds were stolen in any of these two incidents.
CCleaner Compromised to Distribute Malware for Almost a Month
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware. [...]
https://www.bleepingcomputer.com/news/security/ccleaner-compromised-to-distribute-malware-for-almost-a-month/
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware. [...]
https://www.bleepingcomputer.com/news/security/ccleaner-compromised-to-distribute-malware-for-almost-a-month/
BleepingComputer
CCleaner Compromised to Distribute Malware for Almost a Month
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware.
CCleaner Malware Incident - What You Need to Know and How to Remove
This article contains information and answers to frequently asked questions regarding the CCleaner malware incident and how to remove the malware-laced CCleaner version. [...]
https://www.bleepingcomputer.com/how-to/security/ccleaner-malware-incident-what-you-need-to-know-and-how-to-remove/
This article contains information and answers to frequently asked questions regarding the CCleaner malware incident and how to remove the malware-laced CCleaner version. [...]
https://www.bleepingcomputer.com/how-to/security/ccleaner-malware-incident-what-you-need-to-know-and-how-to-remove/
BleepingComputer
CCleaner Malware Incident - What You Need to Know and How to Remove
This article contains information and answers to frequently asked questions regarding the CCleaner malware incident and how to remove the malware-laced CCleaner version.
Researchers Discover New Android Banking Trojan
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution. [...]
https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution. [...]
https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/
BleepingComputer
Researchers Discover New Android Banking Trojan
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution.
FBI Looking for Hacker Terrorizing Montana High Schools
The FBI and Montana law enforcement is looking for a hacker who's been terrorizing local high schools for the past five days, threatening both students' families and teachers alike. [...]
https://www.bleepingcomputer.com/news/security/fbi-looking-for-hacker-terrorizing-montana-high-schools/
The FBI and Montana law enforcement is looking for a hacker who's been terrorizing local high schools for the past five days, threatening both students' families and teachers alike. [...]
https://www.bleepingcomputer.com/news/security/fbi-looking-for-hacker-terrorizing-montana-high-schools/
BleepingComputer
FBI Looking for Hacker Terrorizing Montana High Schools
The FBI and Montana law enforcement is looking for a hacker who's been terrorizing local high schools for the past five days, threatening both students' families and teachers alike.
Locky Ransomware switches to the Ykcol Extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcol Ransomware, but rather Locky. [...]
https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/
Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcol Ransomware, but rather Locky. [...]
https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/
BleepingComputer
Locky Ransomware Switches to the Ykcol Extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcol…
Avast Clarifies Details Surrounding CCleaner Malware Incident
Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling. [...]
https://www.bleepingcomputer.com/news/security/avast-clarifies-details-surrounding-ccleaner-malware-incident/
Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling. [...]
https://www.bleepingcomputer.com/news/security/avast-clarifies-details-surrounding-ccleaner-malware-incident/
BleepingComputer
Avast Clarifies Details Surrounding CCleaner Malware Incident
Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling.
Chinese Mobile Antivirus App Caught Siphoning User Data
Google removed — and then reinstated — one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/chinese-mobile-antivirus-app-caught-siphoning-user-data/
Google removed — and then reinstated — one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/chinese-mobile-antivirus-app-caught-siphoning-user-data/
BleepingComputer
Chinese Mobile Antivirus App Caught Siphoning User Data
Google removed — and then reinstated — one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones.
Russian Authorities Announce Takedown of RAMP Dark Web Marketplace
Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] — a Tor-based market that primarily sold drugs — a Russian Interior Ministry official told Russian news agency TASS today. [...]
https://www.bleepingcomputer.com/news/security/russian-authorities-announce-takedown-of-ramp-dark-web-marketplace/
Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] — a Tor-based market that primarily sold drugs — a Russian Interior Ministry official told Russian news agency TASS today. [...]
https://www.bleepingcomputer.com/news/security/russian-authorities-announce-takedown-of-ramp-dark-web-marketplace/
BleepingComputer
Russian Authorities Announce Takedown of RAMP Dark Web Marketplace
Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] — a Tor-based market that primarily sold drugs — a Russian Interior Ministry official told Russian news agency TASS today.
Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent. [...]
https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent. [...]
https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/
BleepingComputer
Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent.
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators. [...]
https://www.bleepingcomputer.com/news/security/malware-uses-security-cameras-with-infrared-capabilities-to-steal-data/
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators. [...]
https://www.bleepingcomputer.com/news/security/malware-uses-security-cameras-with-infrared-capabilities-to-steal-data/
BleepingComputer
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators.
Windows 10 Insider Build 16291 for PC Lets you Finish Articles Started on Your Phone
Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when on your phone and then continue reading it on your computer. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16291-for-pc-lets-you-finish-articles-started-on-your-phone/
Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when on your phone and then continue reading it on your computer. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16291-for-pc-lets-you-finish-articles-started-on-your-phone/
BleepingComputer
Windows 10 Insider Build 16291 for PC Lets you Finish Articles Started on Your Phone
Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when on…
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests. [...]
https://www.bleepingcomputer.com/news/security/iterm2-leaks-everything-you-hover-in-your-terminal-via-dns-requests/
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests. [...]
https://www.bleepingcomputer.com/news/security/iterm2-leaks-everything-you-hover-in-your-terminal-via-dns-requests/
BleepingComputer
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests.