Shamoon Disk-Wiping Malware Re-emerges with Two New Variants
Two new samples of the Shamoon data have been discovered in the wild, after a period of silence that lasted for about two years. [...]
https://www.bleepingcomputer.com/news/security/shamoon-disk-wiping-malware-re-emerges-with-two-new-variants/
Two new samples of the Shamoon data have been discovered in the wild, after a period of silence that lasted for about two years. [...]
https://www.bleepingcomputer.com/news/security/shamoon-disk-wiping-malware-re-emerges-with-two-new-variants/
BleepingComputer
Shamoon Disk-Wiping Malware Re-emerges with Two New Variants
Two new samples of the Shamoon data have been discovered in the wild, after a period of silence that lasted for about two years.
New Bomb Threat Email Scam Campaign Demanding $20K in Bitcoin
A new twist in the scam extortion emails that have been so popular recently is a new email campaign that contains a bomb threat stating they will detonate a bomb if the recipient does not send a $20,000 USD bitcoin payment. [...]
https://www.bleepingcomputer.com/news/security/new-bomb-threat-email-scam-campaign-demanding-20k-in-bitcoin/
A new twist in the scam extortion emails that have been so popular recently is a new email campaign that contains a bomb threat stating they will detonate a bomb if the recipient does not send a $20,000 USD bitcoin payment. [...]
https://www.bleepingcomputer.com/news/security/new-bomb-threat-email-scam-campaign-demanding-20k-in-bitcoin/
BleepingComputer
New Bomb Threat Email Scam Campaign Demanding $20K in Bitcoin
A new twist in the scam extortion emails is a new email campaign originating from Russia that contains a bomb threat stating they will detonate a bomb if the recipient does not send a $20,000 USD bitcoin payment.
WordPress Security Patch Addresses Privacy Leak Bug
WordPress released a security patch for its software, fixing seven vulnerabilities in version 5.0.1. One of them stands out as it allows search engines to index email addresses and even passwords. [...]
https://www.bleepingcomputer.com/news/security/wordpress-security-patch-addresses-privacy-leak-bug/
WordPress released a security patch for its software, fixing seven vulnerabilities in version 5.0.1. One of them stands out as it allows search engines to index email addresses and even passwords. [...]
https://www.bleepingcomputer.com/news/security/wordpress-security-patch-addresses-privacy-leak-bug/
BleepingComputer
WordPress Security Patch Addresses Privacy Leak Bug
WordPress released a security patch for its software, fixing seven vulnerabilities in version 5.0.1. One of them stands out as it allows search engines to index email addresses and even passwords.
Save the Children Charity Org Scammed for Almost $1 Million
If certain crooks have some sort of moral compass that keeps them away from certain victims, others ditch such boundaries for the right amount of money. A perpetrator from the latter category was able to fool the charitable organization Save the Children into misdirecting close to $1million. [...]
https://www.bleepingcomputer.com/news/security/save-the-children-charity-org-scammed-for-almost-1-million/
If certain crooks have some sort of moral compass that keeps them away from certain victims, others ditch such boundaries for the right amount of money. A perpetrator from the latter category was able to fool the charitable organization Save the Children into misdirecting close to $1million. [...]
https://www.bleepingcomputer.com/news/security/save-the-children-charity-org-scammed-for-almost-1-million/
BleepingComputer
Save the Children Charity Org Scammed for Almost $1 Million
If certain crooks have some sort of moral compass that keeps them away from certain victims, others ditch such boundaries for the right amount of money. A perpetrator from the latter category was able to fool the charitable organization Save the Childrenβ¦
Facebook Photo API Bug Exposed Pics of Up to 6.8 Million Users
Facebook just announced that a bug in its application programming interface for photos may have allowed third-party unauthorized access to images on 6.8 million accounts. [...]
https://www.bleepingcomputer.com/news/security/facebook-photo-api-bug-exposed-pics-of-up-to-68-million-users/
Facebook just announced that a bug in its application programming interface for photos may have allowed third-party unauthorized access to images on 6.8 million accounts. [...]
https://www.bleepingcomputer.com/news/security/facebook-photo-api-bug-exposed-pics-of-up-to-68-million-users/
BleepingComputer
Facebook Photo API Bug Exposed Pics of Up to 6.8 Million Users
Facebook just announced that a bug in its application programming interface for photos may have allowed third-party unauthorized access to images on 6.8 million accounts.
123456 Is the Most Used Password for the 5th Year in a Row
For the 5th year in a row, "123456" is most used password, with "password" coming in at second place. Even in the wake of a constant stream of data breaches, hacks, and ransomware attack reports people continue to utilize weak passwords that not only put their information at jeopardy, but also their organization's data. [...]
https://www.bleepingcomputer.com/news/security/123456-is-the-most-used-password-for-the-5th-year-in-a-row/
For the 5th year in a row, "123456" is most used password, with "password" coming in at second place. Even in the wake of a constant stream of data breaches, hacks, and ransomware attack reports people continue to utilize weak passwords that not only put their information at jeopardy, but also their organization's data. [...]
https://www.bleepingcomputer.com/news/security/123456-is-the-most-used-password-for-the-5th-year-in-a-row/
BleepingComputer
123456 Is the Most Used Password for the 5th Year in a Row
For the 5th year in a row, "123456" is most used password, with "password" coming in at second place. Even in the wake of a constant stream of data breaches, hacks, and ransomware attack reports people continue to utilize weak passwords that not only putβ¦
Microsoft Launches AI Malware Prediction Competition with $25K Prize
Microsoft is challenging the data science community to come up with AI models that can accurately predict whether a computer would become infected based on the device's configuration. The team who successfully predicts the most malware will win a prize of $25,000 USD. [...]
https://www.bleepingcomputer.com/news/security/microsoft-launches-ai-malware-prediction-competition-with-25k-prize/
Microsoft is challenging the data science community to come up with AI models that can accurately predict whether a computer would become infected based on the device's configuration. The team who successfully predicts the most malware will win a prize of $25,000 USD. [...]
https://www.bleepingcomputer.com/news/security/microsoft-launches-ai-malware-prediction-competition-with-25k-prize/
BleepingComputer
Microsoft Launches AI Malware Prediction Competition with $25K Prize
Microsoft is challenging the data science community to come up with AI models that can accurately predict whether a computer would become infected based on the device's configuration. The team who successfully predicts the most malware will win a prize ofβ¦
Neofetch Creates Colorful System Information Screens using Ascii Art
If you ever wanted to share you system information with another user, whether that be in a support forum or to show off your rig, its always nice to do so in style. A program called Neofetch allows you to do so using colorful ascii operating system logos along with information about your system that you can then share as an image. [...]
https://www.bleepingcomputer.com/news/software/neofetch-creates-colorful-system-information-screens-using-ascii-art/
If you ever wanted to share you system information with another user, whether that be in a support forum or to show off your rig, its always nice to do so in style. A program called Neofetch allows you to do so using colorful ascii operating system logos along with information about your system that you can then share as an image. [...]
https://www.bleepingcomputer.com/news/software/neofetch-creates-colorful-system-information-screens-using-ascii-art/
BleepingComputer
Neofetch Creates Colorful System Information Screens using Ascii Art
If you ever wanted to share you system information with another user, whether that be in a support forum or to show off your rig, its always nice to do so in style. A program called Neofetch allows you to do so using colorful ascii operating system logosβ¦
The Week in Ransomware - December 14th 2018 - Slow Week
It is a pretty slow week as we lead up to the holidays. Historically, ransomware tends to slow down during this time as people go away for vacation and businesses take more time off. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-14th-2018-slow-week/
It is a pretty slow week as we lead up to the holidays. Historically, ransomware tends to slow down during this time as people go away for vacation and businesses take more time off. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-14th-2018-slow-week/
BleepingComputer
The Week in Ransomware - December 14th 2018 - Slow Week
It is a pretty slow week as we lead up to the holidays. Historically, ransomware tends to slow down during this time as people go away for vacation and businesses take more time off.
Twitter Fixes Bug That Gives Unauthorized Access to Direct Messages
A bug affecting the permissions dialog when authorizing certain apps to Twitter leaves direct messages exposed to the third-party without the user ever knowing about it. [...]
https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/
A bug affecting the permissions dialog when authorizing certain apps to Twitter leaves direct messages exposed to the third-party without the user ever knowing about it. [...]
https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/
BleepingComputer
Twitter Fixes Bug That Gives Unauthorized Access to Direct Messages
A bug affecting the permissions dialog when authorizing certain apps to Twitter leaves direct messages exposed to the third-party without the user ever knowing about it.
U.S. Ballistic Missile Defense Systems Fail Cybersecurity Audit
A U.S. Department of Defense Inspector General report released this week outlines the inadequate cybersecurity practices being used to protect the United States' ballistic missile defense systems (BMDS ). [...]
https://www.bleepingcomputer.com/news/security/us-ballistic-missile-defense-systems-fail-cybersecurity-audit/
A U.S. Department of Defense Inspector General report released this week outlines the inadequate cybersecurity practices being used to protect the United States' ballistic missile defense systems (BMDS ). [...]
https://www.bleepingcomputer.com/news/security/us-ballistic-missile-defense-systems-fail-cybersecurity-audit/
BleepingComputer
U.S. Ballistic Missile Defense Systems Fail Cybersecurity Audit
A U.S. Department of Defense Inspector General report released this week outlines the inadequate cybersecurity practices being used to protect the United States' ballistic missile defense systems (BMDS ).
Phishing Attack Pretends to be a Office 365 Non-Delivery Email
A phishing campaign has been discovered that pretends to be a non-delivery notifications from Office 365 that leads you to a page attempting to steal your login credentails. [...]
https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/
A phishing campaign has been discovered that pretends to be a non-delivery notifications from Office 365 that leads you to a page attempting to steal your login credentails. [...]
https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/
BleepingComputer
Phishing Attack Pretends to be a Office 365 Non-Delivery Email
A phishing campaign has been discovered that pretends to be a non-delivery notifications from Office 365 that leads you to a page attempting to steal your login credentails.
How to Decrypt HiddenTear Ransomware with HT Brute Forcer
If you have been infected with a HiddenTear Ransomware variant, then you are in luck as a decryptor called HT Brute Forcer has been created by Michael Gillespie that allows you decrypt your files without having to pay the ransom. [...]
https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/
If you have been infected with a HiddenTear Ransomware variant, then you are in luck as a decryptor called HT Brute Forcer has been created by Michael Gillespie that allows you decrypt your files without having to pay the ransom. [...]
https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/
BleepingComputer
How to Decrypt HiddenTear Ransomware with HT Brute Forcer
If you have been infected with a HiddenTear Ransomware variant, then you are in luck as a decryptor called HT Brute Forcer has been created by Michael Gillespie that allows you decrypt your files without having to pay the ransom.
Shamoon Disk Wiper Returns with Second Sample Uncovered this Month
Shamoon's comeback early last week was not marked by one, but two occurrences of the data-wiping malware. The second sighting observed a different sample that could indicate a follow-up to the initial attack. [...]
https://www.bleepingcomputer.com/news/security/shamoon-disk-wiper-returns-with-second-sample-uncovered-this-month/
Shamoon's comeback early last week was not marked by one, but two occurrences of the data-wiping malware. The second sighting observed a different sample that could indicate a follow-up to the initial attack. [...]
https://www.bleepingcomputer.com/news/security/shamoon-disk-wiper-returns-with-second-sample-uncovered-this-month/
BleepingComputer
Shamoon Disk Wiper Returns with Second Sample Uncovered this Month
Shamoon's comeback early last week was not marked by one, but two occurrences of the data-wiping malware. The second sighting observed a different sample that could indicate a follow-up to the initial attack.
How to Decrypt the InsaneCrypt or Everbe 1 Family of Ransomware
If you are infected with the InsaneCrypt or Everbe 1.0 family of ransomware infections, a decryptor has been created that recover your files for free. [...]
https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-the-insanecrypt-or-everbe-1-family-of-ransomware/
If you are infected with the InsaneCrypt or Everbe 1.0 family of ransomware infections, a decryptor has been created that recover your files for free. [...]
https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-the-insanecrypt-or-everbe-1-family-of-ransomware/
Windows 10 to Get New Task Manager, Action Center and File Explorer Features
Windows 10's next update codenamed '19H1' will reportedly come with Microsoft Flow-powered custom actions for the Action Center, independent dark theme toggle for File Explorer, new Task Manager feature and more. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-to-get-new-task-manager-action-center-and-file-explorer-features/
Windows 10's next update codenamed '19H1' will reportedly come with Microsoft Flow-powered custom actions for the Action Center, independent dark theme toggle for File Explorer, new Task Manager feature and more. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-to-get-new-task-manager-action-center-and-file-explorer-features/
BleepingComputer
Windows 10 to Get New Task Manager, Action Center and File Explorer Features
Windows 10's next update codenamed '19H1' will reportedly come with Microsoft Flow-powered custom actions for the Action Center, independent dark theme toggle for File Explorer, new Task Manager feature and more.
New Extortion Email Threatens to Send a Hitman Unless You Pay 4K
These extortion emails are getting wilder and wilder. First we had the sextortion scams that threatened to reveal victims doing dirty deeds, then bomb threats, which brought the attention of law enforcement worldwide, and now we have threats that a hitman is targeting you unless you pay $4,000 in bitcoin. [...]
https://www.bleepingcomputer.com/news/security/new-extortion-email-threatens-to-send-a-hitman-unless-you-pay-4k/
These extortion emails are getting wilder and wilder. First we had the sextortion scams that threatened to reveal victims doing dirty deeds, then bomb threats, which brought the attention of law enforcement worldwide, and now we have threats that a hitman is targeting you unless you pay $4,000 in bitcoin. [...]
https://www.bleepingcomputer.com/news/security/new-extortion-email-threatens-to-send-a-hitman-unless-you-pay-4k/
BleepingComputer
New Extortion Email Threatens to Send a Hitman Unless You Pay 4K
These extortion emails are getting wilder and wilder. First we had the sextortion scams that threatened to reveal victims doing dirty deeds, then bomb threats, which brought the attention of law enforcement worldwide, and now we have threats that a hitmanβ¦
File Inclusion Bug in Kibana Console for Elasticsearch Gets Exploit Code
Exploit code has been published for a local file inclusion (LFI) type of vulnerability affecting the Console plugin in Kibana data visualization tool for Elasticsearch; an attacker could use this to upload a malicious script and potentially get remote code execution. [...]
https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/
Exploit code has been published for a local file inclusion (LFI) type of vulnerability affecting the Console plugin in Kibana data visualization tool for Elasticsearch; an attacker could use this to upload a malicious script and potentially get remote code execution. [...]
https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/
BleepingComputer
File Inclusion Bug in Kibana Console for Elasticsearch Gets Exploit Code
Exploit code has been published for a local file inclusion (LFI) type of vulnerability affecting the Console plugin in Kibana data visualization tool for Elasticsearch; an attacker could use this to upload a malicious script and potentially get remote codeβ¦
A Look at 3 Illicit Mining Groups Who Target Enterprise Services
New research explores the similarities of three illicit mining cybercrime groups that are known to compromise enterprise services in order to install miners. Combined, these three groups have generated approximately 1,200 Monero coins, [...]
https://www.bleepingcomputer.com/news/security/a-look-at-3-illicit-mining-groups-who-target-enterprise-services/
New research explores the similarities of three illicit mining cybercrime groups that are known to compromise enterprise services in order to install miners. Combined, these three groups have generated approximately 1,200 Monero coins, [...]
https://www.bleepingcomputer.com/news/security/a-look-at-3-illicit-mining-groups-who-target-enterprise-services/
BleepingComputer
A Look at 3 Illicit Mining Groups Who Target Enterprise Services
New research explores the similarities of three illicit mining cybercrime groups that are known to compromise enterprise services in order to install miners. Combined, these three groups have generated approximately 1,200 Monero coins,
Widespread Apple ID Phishing Attack Pretends to be App Store Receipts
A widespread and sneaky phishing campaign is underway that pretends to be a purchase confirmation from the Apple App store. Once a user clicks the link, down the rabbit hole they go. [...]
https://www.bleepingcomputer.com/news/security/widespread-apple-id-phishing-attack-pretends-to-be-app-store-receipts/
A widespread and sneaky phishing campaign is underway that pretends to be a purchase confirmation from the Apple App store. Once a user clicks the link, down the rabbit hole they go. [...]
https://www.bleepingcomputer.com/news/security/widespread-apple-id-phishing-attack-pretends-to-be-app-store-receipts/
BleepingComputer
Widespread Apple ID Phishing Attack Pretends to be App Store Receipts
A widespread and sneaky phishing campaign is underway that pretends to be a purchase confirmation from the Apple App store. Once a user clicks the link, down the rabbit hole they go.
ASUS, GIGABYTE Drivers Contain Code Execution Vulnerabilities - PoCs Galore
Four drivers from ASUS and GIGABYTE come with several vulnerabilities that can be leveraged by an attacker to gain higher permissions on the system and to execute arbitrary code. [...]
https://www.bleepingcomputer.com/news/security/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore/
Four drivers from ASUS and GIGABYTE come with several vulnerabilities that can be leveraged by an attacker to gain higher permissions on the system and to execute arbitrary code. [...]
https://www.bleepingcomputer.com/news/security/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore/
BleepingComputer
ASUS, GIGABYTE Drivers Contain Code Execution Vulnerabilities - PoCs Galore
Four drivers from ASUS and GIGABYTE come with several vulnerabilities that can be leveraged by an attacker to gain higher permissions on the system and to execute arbitrary code.