Ransomware Infects 100K PCs in China, Demands WeChat Payment
Over 100,000 thousand computers in China have been infected in just a few days with poorly-written ransomware that encrypts local files and steals credentials for multiple Chinese online services. [...]
https://www.bleepingcomputer.com/news/security/ransomware-infects-100k-pcs-in-china-demands-wechat-payment/
Over 100,000 thousand computers in China have been infected in just a few days with poorly-written ransomware that encrypts local files and steals credentials for multiple Chinese online services. [...]
https://www.bleepingcomputer.com/news/security/ransomware-infects-100k-pcs-in-china-demands-wechat-payment/
BleepingComputer
Ransomware Infects 100K PCs in China, Demands WeChat Payment
Over 100,000 thousand computers in China have been infected in just a few days with poorly-written ransomware that encrypts local files and steals credentials for multiple Chinese online services.
Adobe Fixes Zero-Day Flash Player Vulnerability Used in APT Attack on Russia
Adobe has released an update for Flash Player that fixes a zero-day user after free vulnerability that was used as part of an APT attack against Russia. This attack is being named "Operation Poison Needle" and targeted the Russian FSBI "Polyclinic #2" medical clinic. [...]
https://www.bleepingcomputer.com/news/security/adobe-fixes-zero-day-flash-player-vulnerability-used-in-apt-attack-on-russia/
Adobe has released an update for Flash Player that fixes a zero-day user after free vulnerability that was used as part of an APT attack against Russia. This attack is being named "Operation Poison Needle" and targeted the Russian FSBI "Polyclinic #2" medical clinic. [...]
https://www.bleepingcomputer.com/news/security/adobe-fixes-zero-day-flash-player-vulnerability-used-in-apt-attack-on-russia/
BleepingComputer
Adobe Fixes Zero-Day Flash Player Vulnerability Used in APT Attack on Russia
Adobe has released an update for Flash Player that fixes a zero-day user after free vulnerability that was used as part of an APT attack against Russia. This attack is being named "Operation Poison Needle" and targeted the Russian FSBI "Polyclinic #2" medicalβ¦
Company Pretends to Decrypt Ransomware But Just Pays Ransom
Ransomware is a serious threat but also a lucrative business for crooks and scammers posing as IT professionals promising successful decryption services for the right price. [...]
https://www.bleepingcomputer.com/news/security/company-pretends-to-decrypt-ransomware-but-just-pays-ransom/
Ransomware is a serious threat but also a lucrative business for crooks and scammers posing as IT professionals promising successful decryption services for the right price. [...]
https://www.bleepingcomputer.com/news/security/company-pretends-to-decrypt-ransomware-but-just-pays-ransom/
BleepingComputer
Company Pretends to Decrypt Ransomware But Just Pays Ransom
Ransomware is a serious threat but also a lucrative business for crooks and scammers posing as IT professionals promising successful decryption services for the right price.
SNDBOX - an AI Powered Malware Analysis Site is Launched
Today at Blackhat Europe, a new malware analysis service was unveiled called SNDBOX that utilizes artificial intelligence and a hardened virtual environment to perform static and dynamic analysis of malware samples. [...]
https://www.bleepingcomputer.com/news/security/sndbox-an-ai-powered-malware-analysis-site-is-launched/
Today at Blackhat Europe, a new malware analysis service was unveiled called SNDBOX that utilizes artificial intelligence and a hardened virtual environment to perform static and dynamic analysis of malware samples. [...]
https://www.bleepingcomputer.com/news/security/sndbox-an-ai-powered-malware-analysis-site-is-launched/
BleepingComputer
SNDBOX - an AI Powered Malware Analysis Site is Launched
Today at Blackhat Europe, a new malware analysis service was unveiled called SNDBOX that utilizes artificial intelligence and a hardened virtual environment to perform static and dynamic analysis of malware samples.
Android Users are Receiving Maps Notification Spam and No One Knows Why
Users are receiving spam notifications through the Google Maps app that asks them to share their location in order to get something for free and no one knows why. [...]
https://www.bleepingcomputer.com/news/security/android-users-are-receiving-maps-notification-spam-and-no-one-knows-why/
Users are receiving spam notifications through the Google Maps app that asks them to share their location in order to get something for free and no one knows why. [...]
https://www.bleepingcomputer.com/news/security/android-users-are-receiving-maps-notification-spam-and-no-one-knows-why/
BleepingComputer
Android Users are Receiving Maps Notification Spam and No One Knows Why
Users are receiving spam notifications through the Google Maps app that asks them to share their location in order to get something for free and no one knows why.
Apple Fixes Passcode Bypass, RCE Vulnerabilities, and More in Today's Updates.
Today Apple released updates for their core products that includes iCloud, Safari, iTunes, macOS Mojave, High Sierra, Sierra, Shortcuts for iOS 2.1.2, tvOS 12.1.1, and of course iOS 12.1.1. [...]
https://www.bleepingcomputer.com/news/apple/apple-fixes-passcode-bypass-rce-vulnerabilities-and-more-in-todays-updates/
Today Apple released updates for their core products that includes iCloud, Safari, iTunes, macOS Mojave, High Sierra, Sierra, Shortcuts for iOS 2.1.2, tvOS 12.1.1, and of course iOS 12.1.1. [...]
https://www.bleepingcomputer.com/news/apple/apple-fixes-passcode-bypass-rce-vulnerabilities-and-more-in-todays-updates/
BleepingComputer
Apple Fixes Passcode Bypass, RCE Vulnerabilities, and More in Today's Updates.
Today Apple released updates for their core products that includes iCloud, Safari, iTunes, macOS Mojave, High Sierra, Sierra, Shortcuts for iOS 2.1.2, tvOS 12.1.1, and of course iOS 12.1.1.
HackerOne Offers Free Sandboxes To Replicate Real-World Security Bugs
HackerOne has announced that it makes available to hackers that want to test and hone their skills a set of five sandbox environments modeled after popular security bugs reported through its platform. [...]
https://www.bleepingcomputer.com/news/security/hackerone-offers-free-sandboxes-to-replicate-real-world-security-bugs/
HackerOne has announced that it makes available to hackers that want to test and hone their skills a set of five sandbox environments modeled after popular security bugs reported through its platform. [...]
https://www.bleepingcomputer.com/news/security/hackerone-offers-free-sandboxes-to-replicate-real-world-security-bugs/
BleepingComputer
HackerOne Offers Free Sandboxes To Replicate Real-World Security Bugs
HackerOne has announced that it makes available to hackers that want to test and hone their skills a set of five sandbox environments modeled after popular security bugs reported through its platform.
Windows 10 Version 1809 Cumulative Update Build 17763.168 Released
Microsoft has rolled out a new cumulative update for Windows 10 October 2018 Update (version 1809). Windows 10 KB4469342 has been in testing for quite a while now and today it's rolling out to the general public. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-version-1809-cumulative-update-build-17763168-released/
Microsoft has rolled out a new cumulative update for Windows 10 October 2018 Update (version 1809). Windows 10 KB4469342 has been in testing for quite a while now and today it's rolling out to the general public. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-version-1809-cumulative-update-build-17763168-released/
BleepingComputer
Windows 10 Version 1809 Cumulative Update Build 17763.168 Released
Microsoft has rolled out a new cumulative update for Windows 10 October 2018 Update (version 1809). Windows 10 KB4469342 has been in testing for quite a while now and today it's rolling out to the general public.
Unprotected MongoDB Exposes Scraped Profile Data of 66 Million
Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles. [...]
https://www.bleepingcomputer.com/news/security/unprotected-mongodb-exposes-scraped-profile-data-of-66-million/
Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles. [...]
https://www.bleepingcomputer.com/news/security/unprotected-mongodb-exposes-scraped-profile-data-of-66-million/
BleepingComputer
Unprotected MongoDB Exposes Scraped Profile Data of 66 Million
Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles.
Microsoft is Rebuilding Edge Browser using Chromium for Windows & macOS
Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring the browser to all supported Windows platforms. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-rebuilding-edge-browser-using-chromium-for-windows-and-macos/
Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring the browser to all supported Windows platforms. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-rebuilding-edge-browser-using-chromium-for-windows-and-macos/
BleepingComputer
Microsoft is Rebuilding Edge Browser using Chromium for Windows & macOS
Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring theβ¦
Chinese Police Arrest Dev Behind UNNAMED1989 WeChat Ransomware
Chinese law enforcement have arrested the developer of the UNNAMED1989 / WeChat Ransomware that recently took China by storm and infected over 100K users in a few days. [...]
https://www.bleepingcomputer.com/news/security/chinese-police-arrest-dev-behind-unnamed1989-wechat-ransomware/
Chinese law enforcement have arrested the developer of the UNNAMED1989 / WeChat Ransomware that recently took China by storm and infected over 100K users in a few days. [...]
https://www.bleepingcomputer.com/news/security/chinese-police-arrest-dev-behind-unnamed1989-wechat-ransomware/
BleepingComputer
Chinese Police Arrest Dev Behind UNNAMED1989 WeChat Ransomware
Chinese law enforcement have arrested the developer of the UNNAMED1989 / WeChat Ransomware that recently took China by storm and infected over 100K users in a few days.
Mozilla Announces a Native ARM64 version of Firefox
Mozilla has announced that they are beginning development of a native ARM64 version of Firefox for the always on, always connected, multi-core Snapdragon platform with Windows 10. [...]
https://www.bleepingcomputer.com/news/software/mozilla-announces-a-native-arm64-version-of-firefox/
Mozilla has announced that they are beginning development of a native ARM64 version of Firefox for the always on, always connected, multi-core Snapdragon platform with Windows 10. [...]
https://www.bleepingcomputer.com/news/software/mozilla-announces-a-native-arm64-version-of-firefox/
BleepingComputer
Mozilla Announces a Native ARM64 version of Firefox
Mozilla has announced that they are beginning development of a native ARM64 version of Firefox for the always on, always connected, multi-core Snapdragon platform with Windows 10.
Botnet of 20,000 WordPress Sites Infecting Other WordPress Sites
A botnet consisting of over 20,000 WordPress sites is being used to attack and infect other WordPress sites. Once compromised, these new sites are added to the botnet so that they too can be used to perform commands for the attackers. [...]
https://www.bleepingcomputer.com/news/security/botnet-of-20-000-wordpress-sites-infecting-other-wordpress-sites/
A botnet consisting of over 20,000 WordPress sites is being used to attack and infect other WordPress sites. Once compromised, these new sites are added to the botnet so that they too can be used to perform commands for the attackers. [...]
https://www.bleepingcomputer.com/news/security/botnet-of-20-000-wordpress-sites-infecting-other-wordpress-sites/
BleepingComputer
Botnet of 20,000 WordPress Sites Infecting Other WordPress Sites
A botnet consisting of over 20,000 WordPress sites is being used to attack and infect other WordPress sites. Once compromised, these new sites are added to the botnet so that they too can be used to perform commands for the attackers.
Netbooks, RPis, & Bash Bunny Gear - Attacking Banks from the Inside
Multiple banks in Eastern Europe have been attacked from inside their network via various electronic devices connected directly to the company's own infrastructure, security researchers have discovered. [...]
https://www.bleepingcomputer.com/news/security/netbooks-rpis-and-bash-bunny-gear-attacking-banks-from-the-inside/
Multiple banks in Eastern Europe have been attacked from inside their network via various electronic devices connected directly to the company's own infrastructure, security researchers have discovered. [...]
https://www.bleepingcomputer.com/news/security/netbooks-rpis-and-bash-bunny-gear-attacking-banks-from-the-inside/
BleepingComputer
Netbooks, RPis, & Bash Bunny Gear - Attacking Banks from the Inside
Multiple banks in Eastern Europe have been attacked from inside their network via various electronic devices connected directly to the company's own infrastructure, security researchers have discovered.
DNA Testing Kits & The Security Risks in Digitized DNA
The addition of digitized DNA provides hackers with another target to exploit and opens up a new and challenging frontier for cybersecurity professionals. There are significant implications involved in digitizing DNA.
"The cyber-physical nature of biotechnology raises unprecedented security concerns," coauthors Jean Peccoud, Jenna... [...]
https://www.bleepingcomputer.com/news/security/dna-testing-kits-and-the-security-risks-in-digitized-dna/
The addition of digitized DNA provides hackers with another target to exploit and opens up a new and challenging frontier for cybersecurity professionals. There are significant implications involved in digitizing DNA.
"The cyber-physical nature of biotechnology raises unprecedented security concerns," coauthors Jean Peccoud, Jenna... [...]
https://www.bleepingcomputer.com/news/security/dna-testing-kits-and-the-security-risks-in-digitized-dna/
BleepingComputer
DNA Testing Kits & The Security Risks in Digitized DNA
The addition of digitized DNA provides hackers with another target to exploit and opens up a new and challenging frontier for cybersecurity professionals. There are significant implications involved in digitizing DNA. "The cyber-physical nature of biotechnologyβ¦
DanaBot Banking Trojan Gets into Spam Business
Authors of the DanaBot banking trojans updated the malware with new features that enabled it to harvest email addresses and send out spam straight from the victim's mailbox. [...]
https://www.bleepingcomputer.com/news/security/danabot-banking-trojan-gets-into-spam-business/
Authors of the DanaBot banking trojans updated the malware with new features that enabled it to harvest email addresses and send out spam straight from the victim's mailbox. [...]
https://www.bleepingcomputer.com/news/security/danabot-banking-trojan-gets-into-spam-business/
BleepingComputer
DanaBot Banking Trojan Gets into Spam Business
Authors of the DanaBot banking trojans updated the malware with new features that enabled it to harvest email addresses and send out spam straight from the victim's mailbox.
Windows 10 Testing New Conversational Date Format in File Explorer
Microsoft is testing a new feature in the Windows 10 19H1 Insider builds (Build 1903) that changes how dates are displayed in File Explorer to a more "conversational format" such as "minutes ago", "yesterday", "hours ago", etc. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-testing-new-conversational-date-format-in-file-explorer/
Microsoft is testing a new feature in the Windows 10 19H1 Insider builds (Build 1903) that changes how dates are displayed in File Explorer to a more "conversational format" such as "minutes ago", "yesterday", "hours ago", etc. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-testing-new-conversational-date-format-in-file-explorer/
BleepingComputer
Windows 10 Testing New Conversational Date Format in File Explorer
Microsoft is testing a new feature in the Windows 10 19H1 Insider builds (Build 1903) that changes how dates are displayed in File Explorer to a more "conversational format" such as "minutes ago", "yesterday", "hours ago", etc.
The Week in Ransomware - December 7th 2018 - WeChat Ransomware, Scammers, & More
This was a pretty interesting week in ransomware. First we had a Chinese ransomware that infected 100,000 victims and then we had research showing how a ransomware decryption service was just paying the ransom and tacking on a large fee. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-7th-2018-wechat-ransomware-scammers-and-more/
This was a pretty interesting week in ransomware. First we had a Chinese ransomware that infected 100,000 victims and then we had research showing how a ransomware decryption service was just paying the ransom and tacking on a large fee. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-7th-2018-wechat-ransomware-scammers-and-more/
BleepingComputer
The Week in Ransomware - December 7th 2018 - WeChat Ransomware, Scammers, & More
This was a pretty interesting week in ransomware. First we had a Chinese ransomware that infected 100,000 victims and then we had research showing how a ransomware decryption service was just paying the ransom and tacking on a large fee.
WebKit Vulnerability Affects Latest Versions of Apple Safari
A researcher published exploit code for a vulnerability in WebKit, the web browser engine that powers Apple's Safari, along with other apps on macOS, iOS, and Linux. [...]
https://www.bleepingcomputer.com/news/security/webkit-vulnerability-affects-latest-versions-of-apple-safari/
A researcher published exploit code for a vulnerability in WebKit, the web browser engine that powers Apple's Safari, along with other apps on macOS, iOS, and Linux. [...]
https://www.bleepingcomputer.com/news/security/webkit-vulnerability-affects-latest-versions-of-apple-safari/
BleepingComputer
WebKit Vulnerability Affects Latest Versions of Apple Safari
A researcher published exploit code for a vulnerability in WebKit, the web browser engine that powers Apple's Safari, along with other apps on macOS, iOS, and Linux.
Sextortion Emails now Leading to Ransomware and Info-Stealing Trojans
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads and installs the GandCrab ransomware. [...]
https://www.bleepingcomputer.com/news/security/sextortion-emails-now-leading-to-ransomware-and-info-stealing-trojans/
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads and installs the GandCrab ransomware. [...]
https://www.bleepingcomputer.com/news/security/sextortion-emails-now-leading-to-ransomware-and-info-stealing-trojans/
BleepingComputer
Sextortion Emails now Leading to Ransomware and Info-Stealing Trojans
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads andβ¦
Pressing F7 in the Command Prompt Lists Previously Entered Commands
Did you know that pressing the F7 key while using the Windows command prompt will display a box containing a list of previously typed commands? If not, then these tips may help you use the Command Prompt more efficiently. [...]
https://www.bleepingcomputer.com/news/microsoft/pressing-f7-in-the-command-prompt-lists-previously-entered-commands/
Did you know that pressing the F7 key while using the Windows command prompt will display a box containing a list of previously typed commands? If not, then these tips may help you use the Command Prompt more efficiently. [...]
https://www.bleepingcomputer.com/news/microsoft/pressing-f7-in-the-command-prompt-lists-previously-entered-commands/
BleepingComputer
Pressing F7 in the Command Prompt Lists Previously Entered Commands
Did you know that pressing the F7 key while using the Windows command prompt will display a box containing a list of previously typed commands? If not, then these tips may help you use the Command Prompt more efficiently.