LiteBit Bitcoin Exchange Hacked Twice in Two Months
[...]
https://www.bleepingcomputer.com/news/security/litebit-bitcoin-exchange-hacked-twice-in-two-months/
[...]
https://www.bleepingcomputer.com/news/security/litebit-bitcoin-exchange-hacked-twice-in-two-months/
BleepingComputer
LiteBit Bitcoin Exchange Hacked Twice in Two Months
LiteBit.eu β a multi-currency exchange based in the Netherlands β has suffered data breaches two months in a row. According to emails sent to affected customers after each event, no Bitcoin or altcoin funds were stolen in any of these two incidents.
CCleaner Compromised to Distribute Malware for Almost a Month
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware. [...]
https://www.bleepingcomputer.com/news/security/ccleaner-compromised-to-distribute-malware-for-almost-a-month/
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware. [...]
https://www.bleepingcomputer.com/news/security/ccleaner-compromised-to-distribute-malware-for-almost-a-month/
BleepingComputer
CCleaner Compromised to Distribute Malware for Almost a Month
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware.
CCleaner Malware Incident - What You Need to Know and How to Remove
This article contains information and answers to frequently asked questions regarding the CCleaner malware incident and how to remove the malware-laced CCleaner version. [...]
https://www.bleepingcomputer.com/how-to/security/ccleaner-malware-incident-what-you-need-to-know-and-how-to-remove/
This article contains information and answers to frequently asked questions regarding the CCleaner malware incident and how to remove the malware-laced CCleaner version. [...]
https://www.bleepingcomputer.com/how-to/security/ccleaner-malware-incident-what-you-need-to-know-and-how-to-remove/
BleepingComputer
CCleaner Malware Incident - What You Need to Know and How to Remove
This article contains information and answers to frequently asked questions regarding the CCleaner malware incident and how to remove the malware-laced CCleaner version.
Researchers Discover New Android Banking Trojan
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution. [...]
https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution. [...]
https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/
BleepingComputer
Researchers Discover New Android Banking Trojan
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution.
FBI Looking for Hacker Terrorizing Montana High Schools
The FBI and Montana law enforcement is looking for a hacker who's been terrorizing local high schools for the past five days, threatening both students' families and teachers alike. [...]
https://www.bleepingcomputer.com/news/security/fbi-looking-for-hacker-terrorizing-montana-high-schools/
The FBI and Montana law enforcement is looking for a hacker who's been terrorizing local high schools for the past five days, threatening both students' families and teachers alike. [...]
https://www.bleepingcomputer.com/news/security/fbi-looking-for-hacker-terrorizing-montana-high-schools/
BleepingComputer
FBI Looking for Hacker Terrorizing Montana High Schools
The FBI and Montana law enforcement is looking for a hacker who's been terrorizing local high schools for the past five days, threatening both students' families and teachers alike.
Locky Ransomware switches to the Ykcol Extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcol Ransomware, but rather Locky. [...]
https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/
Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcol Ransomware, but rather Locky. [...]
https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/
BleepingComputer
Locky Ransomware Switches to the Ykcol Extension for Encrypted Files
Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcolβ¦
Avast Clarifies Details Surrounding CCleaner Malware Incident
Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling. [...]
https://www.bleepingcomputer.com/news/security/avast-clarifies-details-surrounding-ccleaner-malware-incident/
Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling. [...]
https://www.bleepingcomputer.com/news/security/avast-clarifies-details-surrounding-ccleaner-malware-incident/
BleepingComputer
Avast Clarifies Details Surrounding CCleaner Malware Incident
Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling.
Chinese Mobile Antivirus App Caught Siphoning User Data
Google removed β and then reinstated β one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/chinese-mobile-antivirus-app-caught-siphoning-user-data/
Google removed β and then reinstated β one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones. [...]
https://www.bleepingcomputer.com/news/security/chinese-mobile-antivirus-app-caught-siphoning-user-data/
BleepingComputer
Chinese Mobile Antivirus App Caught Siphoning User Data
Google removed β and then reinstated β one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones.
Russian Authorities Announce Takedown of RAMP Dark Web Marketplace
Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] β a Tor-based market that primarily sold drugs β a Russian Interior Ministry official told Russian news agency TASS today. [...]
https://www.bleepingcomputer.com/news/security/russian-authorities-announce-takedown-of-ramp-dark-web-marketplace/
Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] β a Tor-based market that primarily sold drugs β a Russian Interior Ministry official told Russian news agency TASS today. [...]
https://www.bleepingcomputer.com/news/security/russian-authorities-announce-takedown-of-ramp-dark-web-marketplace/
BleepingComputer
Russian Authorities Announce Takedown of RAMP Dark Web Marketplace
Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] β a Tor-based market that primarily sold drugs β a Russian Interior Ministry official told Russian news agency TASS today.
Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent. [...]
https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent. [...]
https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/
BleepingComputer
Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU
The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent.
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators. [...]
https://www.bleepingcomputer.com/news/security/malware-uses-security-cameras-with-infrared-capabilities-to-steal-data/
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators. [...]
https://www.bleepingcomputer.com/news/security/malware-uses-security-cameras-with-infrared-capabilities-to-steal-data/
BleepingComputer
Malware Uses Security Cameras With Infrared Capabilities to Steal Data
Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators.
Windows 10 Insider Build 16291 for PC Lets you Finish Articles Started on Your Phone
Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when on your phone and then continue reading it on your computer. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16291-for-pc-lets-you-finish-articles-started-on-your-phone/
Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when on your phone and then continue reading it on your computer. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16291-for-pc-lets-you-finish-articles-started-on-your-phone/
BleepingComputer
Windows 10 Insider Build 16291 for PC Lets you Finish Articles Started on Your Phone
Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when onβ¦
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests. [...]
https://www.bleepingcomputer.com/news/security/iterm2-leaks-everything-you-hover-in-your-terminal-via-dns-requests/
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests. [...]
https://www.bleepingcomputer.com/news/security/iterm2-leaks-everything-you-hover-in-your-terminal-via-dns-requests/
BleepingComputer
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests
iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests.
Apple Issues Security Updates for iOS, iTunes, Xcode, Others
Apple published security updates and bulletins for six products such as Xcode 9, tvOS 11, watchOS 4, Safari 11, iOS 11, and iTunes 12.7 (for both macOS and Windows). [...]
https://www.bleepingcomputer.com/news/apple/apple-issues-security-updates-for-ios-itunes-xcode-others/
Apple published security updates and bulletins for six products such as Xcode 9, tvOS 11, watchOS 4, Safari 11, iOS 11, and iTunes 12.7 (for both macOS and Windows). [...]
https://www.bleepingcomputer.com/news/apple/apple-issues-security-updates-for-ios-itunes-xcode-others/
BleepingComputer
Apple Issues Security Updates for iOS, iTunes, Xcode, Others
Apple published security updates and bulletins for six products such as Xcode 9, tvOS 11, watchOS 4, Safari 11, iOS 11, and iTunes 12.7 (for both macOS and Windows).
Optionsbleed Bug Leaks Apache Server Memory
Certain Apache server configurations can leak server memory content via a vulnerability called Optionsbleed β tracked as CVE-2017-9798 β and detailed on Monday by security researcher Hanno BΓΆck. [...]
https://www.bleepingcomputer.com/news/security/optionsbleed-bug-leaks-apache-server-memory/
Certain Apache server configurations can leak server memory content via a vulnerability called Optionsbleed β tracked as CVE-2017-9798 β and detailed on Monday by security researcher Hanno BΓΆck. [...]
https://www.bleepingcomputer.com/news/security/optionsbleed-bug-leaks-apache-server-memory/
BleepingComputer
Optionsbleed Bug Leaks Apache Server Memory
Certain Apache server configurations can leak server memory content via a vulnerability called Optionsbleed β tracked as CVE-2017-9798 β and detailed on Monday by security researcher Hanno BΓΆck.
Underground Hacking Forum Admins Having Second Thoughts About Selling Ransomware
Administrators of various underground hacking forums hosted on both the public Internet and Dark Web are having serious discussions about the ethics of allowing the sale of ransomware via their platforms. [...]
https://www.bleepingcomputer.com/news/security/underground-hacking-forum-admins-having-second-thoughts-about-selling-ransomware/
Administrators of various underground hacking forums hosted on both the public Internet and Dark Web are having serious discussions about the ethics of allowing the sale of ransomware via their platforms. [...]
https://www.bleepingcomputer.com/news/security/underground-hacking-forum-admins-having-second-thoughts-about-selling-ransomware/
BleepingComputer
Underground Hacking Forum Admins Having Second Thoughts About Selling Ransomware
Administrators of various underground hacking forums hosted on both the public Internet and Dark Web are having serious discussions about the "good idea" of allowing the sale of ransomware via their platforms.
Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks
Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target's isolated network. [...]
https://www.bleepingcomputer.com/news/security/attackers-can-use-hvac-systems-to-control-malware-on-air-gapped-networks/
Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target's isolated network. [...]
https://www.bleepingcomputer.com/news/security/attackers-can-use-hvac-systems-to-control-malware-on-air-gapped-networks/
BleepingComputer
Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks
Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target's isolated network.
The Shark CryptoMix Ransomware Variant Smells Blood in the Water
Today, I discovered a new variant of the CryptoMix ransomware that is appending the .SHARK extension to encrypted file names. This family of ransomware usually releases a new version almost every week, if not sooner, so it is a bit surprising to see them take almost three weeks to release this variant. [...]
https://www.bleepingcomputer.com/news/security/the-shark-cryptomix-ransomware-variant-smells-blood-in-the-water/
Today, I discovered a new variant of the CryptoMix ransomware that is appending the .SHARK extension to encrypted file names. This family of ransomware usually releases a new version almost every week, if not sooner, so it is a bit surprising to see them take almost three weeks to release this variant. [...]
https://www.bleepingcomputer.com/news/security/the-shark-cryptomix-ransomware-variant-smells-blood-in-the-water/
BleepingComputer
The Shark CryptoMix Ransomware Variant Smells Blood in the Water
Today, I discovered a new variant of the CryptoMix ransomware that is appending the .SHARK extension to encrypted file names. This family of ransomware usually releases a new version almost every week, if not sooner, so it is a bit surprising to see themβ¦
IT Contractor Tried to Extort Company by Redirecting Website to Porn Site
An Arizona court sentenced a local man to four years of federal probation after what the judge described as a "one-time lapse in judgment" when the man redirected a company's website to a gay porn portal after a failed extortion attempt. [...]
https://www.bleepingcomputer.com/news/legal/it-contractor-tried-to-extort-company-by-redirecting-website-to-porn-site/
An Arizona court sentenced a local man to four years of federal probation after what the judge described as a "one-time lapse in judgment" when the man redirected a company's website to a gay porn portal after a failed extortion attempt. [...]
https://www.bleepingcomputer.com/news/legal/it-contractor-tried-to-extort-company-by-redirecting-website-to-porn-site/
BleepingComputer
IT Contractor Tried to Extort Company by Redirecting Website to Porn Site
An Arizona court sentenced a local man to four years of federal probation after what the judge described as a "one-time lapse in judgment" when the man redirected a company's website to a gay porn portal after a failed extortion attempt.
CCleaner Hack Carried Out In Order to Target Big Tech Companies
The CCleaner hack that took place over the summer and came to light this week might have been carried out by an infamous cyber-espionage group believed to be operating out of China. [...]
https://www.bleepingcomputer.com/news/security/ccleaner-hack-carried-out-in-order-to-target-big-tech-companies/
The CCleaner hack that took place over the summer and came to light this week might have been carried out by an infamous cyber-espionage group believed to be operating out of China. [...]
https://www.bleepingcomputer.com/news/security/ccleaner-hack-carried-out-in-order-to-target-big-tech-companies/
BleepingComputer
CCleaner Hack Carried Out In Order to Target Big Tech Companies
The CCleaner hack that took place over the summer and came to light this week might have been carried out by an infamous cyber-espionage group believed to be operating out of China.
Attackers Take Over WordPress, Joomla, JBoss Servers to Mine Monero
Attacks aimed at delivering cryptocurrency mining tools on enterprise networks have gone up as much as six times, according to telemetry data collected by IBM's X-Force team between January and August 2017. [...]
https://www.bleepingcomputer.com/news/security/attackers-take-over-wordpress-joomla-jboss-servers-to-mine-monero/
Attacks aimed at delivering cryptocurrency mining tools on enterprise networks have gone up as much as six times, according to telemetry data collected by IBM's X-Force team between January and August 2017. [...]
https://www.bleepingcomputer.com/news/security/attackers-take-over-wordpress-joomla-jboss-servers-to-mine-monero/
BleepingComputer
Attackers Take Over WordPress, Joomla, JBoss Servers to Mine Monero
Attacks aimed at delivering cryptocurrency mining tools on enterprise networks have gone up as much as six times, according to telemetry data collected by IBM's X-Force team between January and August 2017.