Windows 10 Version 1809 Cumulative Update Build 17763.168 Released
Microsoft has rolled out a new cumulative update for Windows 10 October 2018 Update (version 1809). Windows 10 KB4469342 has been in testing for quite a while now and today it's rolling out to the general public. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-version-1809-cumulative-update-build-17763168-released/
Microsoft has rolled out a new cumulative update for Windows 10 October 2018 Update (version 1809). Windows 10 KB4469342 has been in testing for quite a while now and today it's rolling out to the general public. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-version-1809-cumulative-update-build-17763168-released/
BleepingComputer
Windows 10 Version 1809 Cumulative Update Build 17763.168 Released
Microsoft has rolled out a new cumulative update for Windows 10 October 2018 Update (version 1809). Windows 10 KB4469342 has been in testing for quite a while now and today it's rolling out to the general public.
Unprotected MongoDB Exposes Scraped Profile Data of 66 Million
Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles. [...]
https://www.bleepingcomputer.com/news/security/unprotected-mongodb-exposes-scraped-profile-data-of-66-million/
Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles. [...]
https://www.bleepingcomputer.com/news/security/unprotected-mongodb-exposes-scraped-profile-data-of-66-million/
BleepingComputer
Unprotected MongoDB Exposes Scraped Profile Data of 66 Million
Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles.
Microsoft is Rebuilding Edge Browser using Chromium for Windows & macOS
Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring the browser to all supported Windows platforms. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-rebuilding-edge-browser-using-chromium-for-windows-and-macos/
Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring the browser to all supported Windows platforms. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-rebuilding-edge-browser-using-chromium-for-windows-and-macos/
BleepingComputer
Microsoft is Rebuilding Edge Browser using Chromium for Windows & macOS
Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring theβ¦
Chinese Police Arrest Dev Behind UNNAMED1989 WeChat Ransomware
Chinese law enforcement have arrested the developer of the UNNAMED1989 / WeChat Ransomware that recently took China by storm and infected over 100K users in a few days. [...]
https://www.bleepingcomputer.com/news/security/chinese-police-arrest-dev-behind-unnamed1989-wechat-ransomware/
Chinese law enforcement have arrested the developer of the UNNAMED1989 / WeChat Ransomware that recently took China by storm and infected over 100K users in a few days. [...]
https://www.bleepingcomputer.com/news/security/chinese-police-arrest-dev-behind-unnamed1989-wechat-ransomware/
BleepingComputer
Chinese Police Arrest Dev Behind UNNAMED1989 WeChat Ransomware
Chinese law enforcement have arrested the developer of the UNNAMED1989 / WeChat Ransomware that recently took China by storm and infected over 100K users in a few days.
Mozilla Announces a Native ARM64 version of Firefox
Mozilla has announced that they are beginning development of a native ARM64 version of Firefox for the always on, always connected, multi-core Snapdragon platform with Windows 10. [...]
https://www.bleepingcomputer.com/news/software/mozilla-announces-a-native-arm64-version-of-firefox/
Mozilla has announced that they are beginning development of a native ARM64 version of Firefox for the always on, always connected, multi-core Snapdragon platform with Windows 10. [...]
https://www.bleepingcomputer.com/news/software/mozilla-announces-a-native-arm64-version-of-firefox/
BleepingComputer
Mozilla Announces a Native ARM64 version of Firefox
Mozilla has announced that they are beginning development of a native ARM64 version of Firefox for the always on, always connected, multi-core Snapdragon platform with Windows 10.
Botnet of 20,000 WordPress Sites Infecting Other WordPress Sites
A botnet consisting of over 20,000 WordPress sites is being used to attack and infect other WordPress sites. Once compromised, these new sites are added to the botnet so that they too can be used to perform commands for the attackers. [...]
https://www.bleepingcomputer.com/news/security/botnet-of-20-000-wordpress-sites-infecting-other-wordpress-sites/
A botnet consisting of over 20,000 WordPress sites is being used to attack and infect other WordPress sites. Once compromised, these new sites are added to the botnet so that they too can be used to perform commands for the attackers. [...]
https://www.bleepingcomputer.com/news/security/botnet-of-20-000-wordpress-sites-infecting-other-wordpress-sites/
BleepingComputer
Botnet of 20,000 WordPress Sites Infecting Other WordPress Sites
A botnet consisting of over 20,000 WordPress sites is being used to attack and infect other WordPress sites. Once compromised, these new sites are added to the botnet so that they too can be used to perform commands for the attackers.
Netbooks, RPis, & Bash Bunny Gear - Attacking Banks from the Inside
Multiple banks in Eastern Europe have been attacked from inside their network via various electronic devices connected directly to the company's own infrastructure, security researchers have discovered. [...]
https://www.bleepingcomputer.com/news/security/netbooks-rpis-and-bash-bunny-gear-attacking-banks-from-the-inside/
Multiple banks in Eastern Europe have been attacked from inside their network via various electronic devices connected directly to the company's own infrastructure, security researchers have discovered. [...]
https://www.bleepingcomputer.com/news/security/netbooks-rpis-and-bash-bunny-gear-attacking-banks-from-the-inside/
BleepingComputer
Netbooks, RPis, & Bash Bunny Gear - Attacking Banks from the Inside
Multiple banks in Eastern Europe have been attacked from inside their network via various electronic devices connected directly to the company's own infrastructure, security researchers have discovered.
DNA Testing Kits & The Security Risks in Digitized DNA
The addition of digitized DNA provides hackers with another target to exploit and opens up a new and challenging frontier for cybersecurity professionals. There are significant implications involved in digitizing DNA.
"The cyber-physical nature of biotechnology raises unprecedented security concerns," coauthors Jean Peccoud, Jenna... [...]
https://www.bleepingcomputer.com/news/security/dna-testing-kits-and-the-security-risks-in-digitized-dna/
The addition of digitized DNA provides hackers with another target to exploit and opens up a new and challenging frontier for cybersecurity professionals. There are significant implications involved in digitizing DNA.
"The cyber-physical nature of biotechnology raises unprecedented security concerns," coauthors Jean Peccoud, Jenna... [...]
https://www.bleepingcomputer.com/news/security/dna-testing-kits-and-the-security-risks-in-digitized-dna/
BleepingComputer
DNA Testing Kits & The Security Risks in Digitized DNA
The addition of digitized DNA provides hackers with another target to exploit and opens up a new and challenging frontier for cybersecurity professionals. There are significant implications involved in digitizing DNA. "The cyber-physical nature of biotechnologyβ¦
DanaBot Banking Trojan Gets into Spam Business
Authors of the DanaBot banking trojans updated the malware with new features that enabled it to harvest email addresses and send out spam straight from the victim's mailbox. [...]
https://www.bleepingcomputer.com/news/security/danabot-banking-trojan-gets-into-spam-business/
Authors of the DanaBot banking trojans updated the malware with new features that enabled it to harvest email addresses and send out spam straight from the victim's mailbox. [...]
https://www.bleepingcomputer.com/news/security/danabot-banking-trojan-gets-into-spam-business/
BleepingComputer
DanaBot Banking Trojan Gets into Spam Business
Authors of the DanaBot banking trojans updated the malware with new features that enabled it to harvest email addresses and send out spam straight from the victim's mailbox.
Windows 10 Testing New Conversational Date Format in File Explorer
Microsoft is testing a new feature in the Windows 10 19H1 Insider builds (Build 1903) that changes how dates are displayed in File Explorer to a more "conversational format" such as "minutes ago", "yesterday", "hours ago", etc. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-testing-new-conversational-date-format-in-file-explorer/
Microsoft is testing a new feature in the Windows 10 19H1 Insider builds (Build 1903) that changes how dates are displayed in File Explorer to a more "conversational format" such as "minutes ago", "yesterday", "hours ago", etc. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-testing-new-conversational-date-format-in-file-explorer/
BleepingComputer
Windows 10 Testing New Conversational Date Format in File Explorer
Microsoft is testing a new feature in the Windows 10 19H1 Insider builds (Build 1903) that changes how dates are displayed in File Explorer to a more "conversational format" such as "minutes ago", "yesterday", "hours ago", etc.
The Week in Ransomware - December 7th 2018 - WeChat Ransomware, Scammers, & More
This was a pretty interesting week in ransomware. First we had a Chinese ransomware that infected 100,000 victims and then we had research showing how a ransomware decryption service was just paying the ransom and tacking on a large fee. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-7th-2018-wechat-ransomware-scammers-and-more/
This was a pretty interesting week in ransomware. First we had a Chinese ransomware that infected 100,000 victims and then we had research showing how a ransomware decryption service was just paying the ransom and tacking on a large fee. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-7th-2018-wechat-ransomware-scammers-and-more/
BleepingComputer
The Week in Ransomware - December 7th 2018 - WeChat Ransomware, Scammers, & More
This was a pretty interesting week in ransomware. First we had a Chinese ransomware that infected 100,000 victims and then we had research showing how a ransomware decryption service was just paying the ransom and tacking on a large fee.
WebKit Vulnerability Affects Latest Versions of Apple Safari
A researcher published exploit code for a vulnerability in WebKit, the web browser engine that powers Apple's Safari, along with other apps on macOS, iOS, and Linux. [...]
https://www.bleepingcomputer.com/news/security/webkit-vulnerability-affects-latest-versions-of-apple-safari/
A researcher published exploit code for a vulnerability in WebKit, the web browser engine that powers Apple's Safari, along with other apps on macOS, iOS, and Linux. [...]
https://www.bleepingcomputer.com/news/security/webkit-vulnerability-affects-latest-versions-of-apple-safari/
BleepingComputer
WebKit Vulnerability Affects Latest Versions of Apple Safari
A researcher published exploit code for a vulnerability in WebKit, the web browser engine that powers Apple's Safari, along with other apps on macOS, iOS, and Linux.
Sextortion Emails now Leading to Ransomware and Info-Stealing Trojans
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads and installs the GandCrab ransomware. [...]
https://www.bleepingcomputer.com/news/security/sextortion-emails-now-leading-to-ransomware-and-info-stealing-trojans/
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads and installs the GandCrab ransomware. [...]
https://www.bleepingcomputer.com/news/security/sextortion-emails-now-leading-to-ransomware-and-info-stealing-trojans/
BleepingComputer
Sextortion Emails now Leading to Ransomware and Info-Stealing Trojans
Sextortion email scams have been a very successful way of generating money for criminals. A new Sextortion campaign is now taking it to the next level by tricking recipients into installing the Azorult information-stealing Trojan, which then downloads andβ¦
Pressing F7 in the Command Prompt Lists Previously Entered Commands
Did you know that pressing the F7 key while using the Windows command prompt will display a box containing a list of previously typed commands? If not, then these tips may help you use the Command Prompt more efficiently. [...]
https://www.bleepingcomputer.com/news/microsoft/pressing-f7-in-the-command-prompt-lists-previously-entered-commands/
Did you know that pressing the F7 key while using the Windows command prompt will display a box containing a list of previously typed commands? If not, then these tips may help you use the Command Prompt more efficiently. [...]
https://www.bleepingcomputer.com/news/microsoft/pressing-f7-in-the-command-prompt-lists-previously-entered-commands/
BleepingComputer
Pressing F7 in the Command Prompt Lists Previously Entered Commands
Did you know that pressing the F7 key while using the Windows command prompt will display a box containing a list of previously typed commands? If not, then these tips may help you use the Command Prompt more efficiently.
Exploit Code for the Kubernetes Flaw Is Now Available
The recently disclosed critical-impact bug in Kubernetes created strong ripples in the security world of the container-orchestration system. Now, multiple demo exploits exist and come with easy-to-understand explanations. [...]
https://www.bleepingcomputer.com/news/security/exploit-code-for-the-kubernetes-flaw-is-now-available/
The recently disclosed critical-impact bug in Kubernetes created strong ripples in the security world of the container-orchestration system. Now, multiple demo exploits exist and come with easy-to-understand explanations. [...]
https://www.bleepingcomputer.com/news/security/exploit-code-for-the-kubernetes-flaw-is-now-available/
BleepingComputer
Exploit Code for the Kubernetes Flaw Is Now Available
The recently disclosed critical-impact bug in Kubernetes created strong ripples in the security world of the container-orchestration system. Now, multiple demo exploits exist and come with easy-to-understand explanations.
Microsoft's New Edge Browser to Support Chrome Extensions - Even Malicious Ones
Microsoft has confirmed that the upcoming Chromium-based Edge browser will also be able to run Chrome extensions. While this will greatly expand the functionality of the browser, it will also open it up to the increasing amount of malicious Chrome extensions that are seen on a daily basis. [...]
https://www.bleepingcomputer.com/news/security/microsofts-new-edge-browser-to-support-chrome-extensions-even-malicious-ones/
Microsoft has confirmed that the upcoming Chromium-based Edge browser will also be able to run Chrome extensions. While this will greatly expand the functionality of the browser, it will also open it up to the increasing amount of malicious Chrome extensions that are seen on a daily basis. [...]
https://www.bleepingcomputer.com/news/security/microsofts-new-edge-browser-to-support-chrome-extensions-even-malicious-ones/
BleepingComputer
Microsoft's New Edge Browser to Support Chrome Extensions - Even Malicious Ones
Microsoft has confirmed that the upcoming Chromium-based Edge browser will also be able to run Chrome extensions. While this will greatly expand the functionality of the browser, it will also open it up to the increasing amount of malicious Chrome extensionsβ¦
Android Clickfraud Op Impersonates iPhones to Bump Ad Premiums
A mobile clickfraud campaign used 22 Android apps to trick online advertisers into paying the higher price for advertising on iPhone 5 to 8 Plus devices. [...]
https://www.bleepingcomputer.com/news/security/android-clickfraud-op-impersonates-iphones-to-bump-ad-premiums/
A mobile clickfraud campaign used 22 Android apps to trick online advertisers into paying the higher price for advertising on iPhone 5 to 8 Plus devices. [...]
https://www.bleepingcomputer.com/news/security/android-clickfraud-op-impersonates-iphones-to-bump-ad-premiums/
BleepingComputer
Android Clickfraud Op Impersonates iPhones to Bump Ad Premiums
A mobile clickfraud campaign used 22 Android apps to trick online advertisers into paying the higher price for advertising on iPhone 5 to 8 Plus devices.
Bug in Google+ API Puts at Risk Privacy of over 52 Million Users
Non-public details on about 52.5 million Google+ profiles were accessible to developers of apps requesting permission to view data the user had configured to remain private. [...]
https://www.bleepingcomputer.com/news/security/bug-in-google-api-puts-at-risk-privacy-of-over-52-million-users/
Non-public details on about 52.5 million Google+ profiles were accessible to developers of apps requesting permission to view data the user had configured to remain private. [...]
https://www.bleepingcomputer.com/news/security/bug-in-google-api-puts-at-risk-privacy-of-over-52-million-users/
BleepingComputer
Bug in Google+ API Puts at Risk Privacy of over 52 Million Users
Non-public details on about 52.5 million Google+ profiles were accessible to developers of apps requesting permission to view data the user had configured to remain private.
Windows 10 Insider Build 18298 Brings New Features and Improvements
Microsoft has released Windows 10 Insider Preview Build 18298 (19H1) to insiders in the Fast ring. This build contains numerous new features and improvements including the ability to setup a security key directly from the Sign-in options screen, a new file explorer icon, Start Menu changes, mouse cursor options, and more. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18298-brings-new-features-and-improvements/
Microsoft has released Windows 10 Insider Preview Build 18298 (19H1) to insiders in the Fast ring. This build contains numerous new features and improvements including the ability to setup a security key directly from the Sign-in options screen, a new file explorer icon, Start Menu changes, mouse cursor options, and more. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18298-brings-new-features-and-improvements/
BleepingComputer
Windows 10 Insider Build 18298 Brings New Features and Improvements
Microsoft has released Windows 10 Insider Preview Build 18298 (19H1) to insiders in the Fast ring. This build contains numerous new features and improvements including the ability to setup a security key directly from the Sign-in options screen, a new fileβ¦
Seedworm Spy Gang Stores Malware on GitHub, Keeps Up with Infosec Advances
The relatively new espionage group Speedworm proves to be highly adaptive by using GitHub to keep their malware and by carefully observing the developments on the infosec scene via social networking services. [...]
https://www.bleepingcomputer.com/news/security/seedworm-spy-gang-stores-malware-on-github-keeps-up-with-infosec-advances/
The relatively new espionage group Speedworm proves to be highly adaptive by using GitHub to keep their malware and by carefully observing the developments on the infosec scene via social networking services. [...]
https://www.bleepingcomputer.com/news/security/seedworm-spy-gang-stores-malware-on-github-keeps-up-with-infosec-advances/
BleepingComputer
Seedworm Spy Gang Stores Malware on GitHub, Keeps Up with Infosec Advances
The relatively new espionage group Speedworm proves to be highly adaptive by using GitHub to keep their malware and by carefully observing the developments on the infosec scene via social networking services.
Hackers Steal Over 40k Logins for Gov Services in 30 Countries
More than 40,000 users victims of phishing attacks had their credentials for unlocking online accounts for government services stolen. The information might have already been sold on underground hacker forums [...]
https://www.bleepingcomputer.com/news/security/hackers-steal-over-40k-logins-for-gov-services-in-30-countries/
More than 40,000 users victims of phishing attacks had their credentials for unlocking online accounts for government services stolen. The information might have already been sold on underground hacker forums [...]
https://www.bleepingcomputer.com/news/security/hackers-steal-over-40k-logins-for-gov-services-in-30-countries/
BleepingComputer
Hackers Steal Over 40k Logins for Gov Services in 30 Countries
More than 40,000 users victims of phishing attacks had their credentials for unlocking online accounts for government services stolen. The information might have already been sold on underground hacker forums