Chrome Extension Manifest V3 May Break uBlock Origin Content Blocker
The Google Chrome development team is working on making some changes to the Chrome Extensions platform that would end the functionality of ad-blockers like uBlock Origin and uMatrix, if implemented as defined in the current draft document. [...]
https://www.bleepingcomputer.com/news/security/chrome-extension-manifest-v3-may-break-ublock-origin-content-blocker/
The Google Chrome development team is working on making some changes to the Chrome Extensions platform that would end the functionality of ad-blockers like uBlock Origin and uMatrix, if implemented as defined in the current draft document. [...]
https://www.bleepingcomputer.com/news/security/chrome-extension-manifest-v3-may-break-ublock-origin-content-blocker/
BleepingComputer
Chrome Extension Manifest V3 May Break uBlock Origin Content Blocker
The Google Chrome development team is working on making some changes to the Chrome Extensions platform that would end the functionality of ad-blockers like uBlock Origin and uMatrix, if implemented as defined in the current draft document.
Apple Fixes Numerous Security Vulnerabilities in iOS, macOS, and More
Today Apple released updates for their core products that includes iCloud, Safari, macOS Mojave, High Sierra, & Sierra, tvOS 12.1.2, and of course iOS 12.1.3. [...]
https://www.bleepingcomputer.com/news/security/apple-fixes-numerous-security-vulnerabilities-in-ios-macos-and-more/
Today Apple released updates for their core products that includes iCloud, Safari, macOS Mojave, High Sierra, & Sierra, tvOS 12.1.2, and of course iOS 12.1.3. [...]
https://www.bleepingcomputer.com/news/security/apple-fixes-numerous-security-vulnerabilities-in-ios-macos-and-more/
BleepingComputer
Apple Fixes Numerous Security Vulnerabilities in iOS, macOS, and More
Today Apple released updates for their core products that includes iCloud, Safari, macOS Mojave, High Sierra, & Sierra, tvOS 12.1.2, and of course iOS 12.1.3.
DHS Issues Emergency Directive to Prevent DNS Hijacking Attacks
The Department of Homeland Security has issued an emergency directive that requires all U.S. agencies that operate a .gov domain or agency-managed domain to audit their DNS records and servers to verify that they are resolving to the right IP addresses. They further require them harden the security related to DNS accounts. [...]
https://www.bleepingcomputer.com/news/security/dhs-issues-emergency-directive-to-prevent-dns-hijacking-attacks/
The Department of Homeland Security has issued an emergency directive that requires all U.S. agencies that operate a .gov domain or agency-managed domain to audit their DNS records and servers to verify that they are resolving to the right IP addresses. They further require them harden the security related to DNS accounts. [...]
https://www.bleepingcomputer.com/news/security/dhs-issues-emergency-directive-to-prevent-dns-hijacking-attacks/
BleepingComputer
DHS Issues Emergency Directive to Prevent DNS Hijacking Attacks
The Department of Homeland Security has issued an emergency directive that requires all U.S. agencies that operate a .gov domain or agency-managed domain to audit their DNS records and servers to verify that they are resolving to the right IP addresses. Theyβ¦
265 Researchers Take Down 100,000 Malware Distribution Websites
Security researchers across the globe united in a project dedicated to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. [...]
https://www.bleepingcomputer.com/news/security/265-researchers-take-down-100-000-malware-distribution-websites/
Security researchers across the globe united in a project dedicated to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. [...]
https://www.bleepingcomputer.com/news/security/265-researchers-take-down-100-000-malware-distribution-websites/
BleepingComputer
265 Researchers Take Down 100,000 Malware Distribution Websites
Security researchers across the globe united in a project dedicated to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution.
New Ransomware Anatova Has Potential for Extended Functionality
A new ransomware family popped on the radar of analysts, who see it as a serious threat created by skilled authors that can turn it into a multifunctional piece of malware. [...]
https://www.bleepingcomputer.com/news/security/new-ransomware-anatova-has-potential-for-extended-functionality/
A new ransomware family popped on the radar of analysts, who see it as a serious threat created by skilled authors that can turn it into a multifunctional piece of malware. [...]
https://www.bleepingcomputer.com/news/security/new-ransomware-anatova-has-potential-for-extended-functionality/
BleepingComputer
New Ransomware Anatova Has Potential for Extended Functionality
A new ransomware family popped on the radar of analysts, who see it as a serious threat created by skilled authors that can turn it into a multifunctional piece of malware.
Wine 4.0 Available with Vulkan, Direct3D 12, Game Controller Support
The Wine 4.0 release adds a number of major new features such as support for the cross-platform Vulkan and the Windows Direct3D 12 3D graphics APIs, as well as for Android High-DPI and game controllers. [...]
https://www.bleepingcomputer.com/news/linux/wine-40-available-with-vulkan-direct3d-12-game-controller-support/
The Wine 4.0 release adds a number of major new features such as support for the cross-platform Vulkan and the Windows Direct3D 12 3D graphics APIs, as well as for Android High-DPI and game controllers. [...]
https://www.bleepingcomputer.com/news/linux/wine-40-available-with-vulkan-direct3d-12-game-controller-support/
BleepingComputer
Wine 4.0 Available with Vulkan, Direct3D 12, Game Controller Support
The Wine 4.0 release adds a number of major new features such as support for the cross-platform Vulkan and the Windows Direct3D 12 3D graphics APIs, as well as for Android High-DPI and game controllers.
Voicemail Phishing Campaign Tricks You Into Verifying Password
A new phishing campaign is underway that utilizes EML attachments that pretend to be a received voicemail and prompts you to login to retrieve it. This campaign also uses a clever tactic of tricking you into entering your password twice in order to confirm that you are providing the correct account credentials. [...]
https://www.bleepingcomputer.com/news/security/voicemail-phishing-campaign-tricks-you-into-verifying-password/
A new phishing campaign is underway that utilizes EML attachments that pretend to be a received voicemail and prompts you to login to retrieve it. This campaign also uses a clever tactic of tricking you into entering your password twice in order to confirm that you are providing the correct account credentials. [...]
https://www.bleepingcomputer.com/news/security/voicemail-phishing-campaign-tricks-you-into-verifying-password/
BleepingComputer
Voicemail Phishing Campaign Tricks You Into Verifying Password
A new phishing campaign is underway that utilizes EML attachments that pretend to be a received voicemail and prompts you to login to retrieve it. This campaign also uses a clever tactic of tricking you into entering your password twice in order to confirmβ¦
Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos
A team of researchers has developed a high accuracy deep learning-based classifier designed to detect YouTube videos with disturbing content for kids. This was done after finding that the current recommendation algorithm used by the platform to suggest related content is quite lacking. [...]
https://www.bleepingcomputer.com/news/security/researchers-create-algorithm-to-protect-kids-from-disturbing-youtube-videos/
A team of researchers has developed a high accuracy deep learning-based classifier designed to detect YouTube videos with disturbing content for kids. This was done after finding that the current recommendation algorithm used by the platform to suggest related content is quite lacking. [...]
https://www.bleepingcomputer.com/news/security/researchers-create-algorithm-to-protect-kids-from-disturbing-youtube-videos/
BleepingComputer
Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos
A team of researchers has developed a high accuracy deep learning-based classifier designed to detect YouTube videos with disturbing content for kids. This was done after finding that the current recommendation algorithm used by the platform to suggest relatedβ¦
Facebook Will Preemptively Close Pages of Owners Who Previously Broke Rules
Facebook announced improvements to their Page content quality features to make sure that content shared on its platform found to break its Community Standards does not escape the counter-measures put in place to prevent distribution. [...]
https://www.bleepingcomputer.com/news/security/facebook-will-preemptively-close-pages-of-owners-who-previously-broke-rules/
Facebook announced improvements to their Page content quality features to make sure that content shared on its platform found to break its Community Standards does not escape the counter-measures put in place to prevent distribution. [...]
https://www.bleepingcomputer.com/news/security/facebook-will-preemptively-close-pages-of-owners-who-previously-broke-rules/
BleepingComputer
Facebook Will Preemptively Close Pages of Owners Who Previously Broke Rules
Facebook announced improvements to their Page content quality features to make sure that content shared on its platform found to break its Community Standards does not escape the counter-measures put in place to prevent distribution.
Running Sysmon 8.0.0? Update to 8.0.4 to Avoid a Memory Leak
A memory leak exists in recent version of the Sysmon utility that could cause a computer to run out of memory and crash if they routinely update its configuration file through a scheduled task or some other manner. [...]
https://www.bleepingcomputer.com/news/security/running-sysmon-800-update-to-804-to-avoid-a-memory-leak/
A memory leak exists in recent version of the Sysmon utility that could cause a computer to run out of memory and crash if they routinely update its configuration file through a scheduled task or some other manner. [...]
https://www.bleepingcomputer.com/news/security/running-sysmon-800-update-to-804-to-avoid-a-memory-leak/
BleepingComputer
Running Sysmon 8.0.0? Update to 8.0.4 to Avoid a Memory Leak
A memory leak exists in recent version of the Sysmon utility that could cause a computer to run out of memory and crash if they routinely update its configuration file through a scheduled task or some other manner.
Beware of Exit Map Spam Pushing GandCrab v5.1 Ransomware
A new malspam campaign pretending to be the current emergency exit map for the recipient's building is being used to install the GandCrab Ransomware. These spam emails contain malicious Word documents that download and install the infection from a remote computer. [...]
https://www.bleepingcomputer.com/news/security/beware-of-exit-map-spam-pushing-gandcrab-v51-ransomware/
A new malspam campaign pretending to be the current emergency exit map for the recipient's building is being used to install the GandCrab Ransomware. These spam emails contain malicious Word documents that download and install the infection from a remote computer. [...]
https://www.bleepingcomputer.com/news/security/beware-of-exit-map-spam-pushing-gandcrab-v51-ransomware/
BleepingComputer
Beware of Exit Map Spam Pushing GandCrab v5.1 Ransomware
A new malspam campaign pretending to be the current emergency exit map for the recipient's building is being used to install the GandCrab Ransomware. These spam emails contain malicious Word documents that download and install the infection from a remoteβ¦
GDPR Compliance Lowers Data Breach Frequency and Impact Says Report
Companies that follow the requirements of the General Data Protection Regulation (GDPR) experience extra benefits such as lower frequency and effect of data breaches, as well as fewer records being impacted in the attacks, shorter downtimes and lower overall costs [...]
https://www.bleepingcomputer.com/news/security/gdpr-compliance-lowers-data-breach-frequency-and-impact-says-report/
Companies that follow the requirements of the General Data Protection Regulation (GDPR) experience extra benefits such as lower frequency and effect of data breaches, as well as fewer records being impacted in the attacks, shorter downtimes and lower overall costs [...]
https://www.bleepingcomputer.com/news/security/gdpr-compliance-lowers-data-breach-frequency-and-impact-says-report/
BleepingComputer
GDPR Compliance Lowers Data Breach Frequency and Impact Says Report
Companies that follow the requirements of the General Data Protection Regulation (GDPR) experience extra benefits such as lower frequency and effect of data breaches, as well as fewer records being impacted in the attacks, shorter downtimes and lower overallβ¦
NumPy Is Awaiting Fix for Critical Remote Code Execution Bug
The current version of the popular NumPy library relies on unsafe default usage of a Python module that could lead to remote code execution in the context of the affected application. [...]
https://www.bleepingcomputer.com/news/security/numpy-is-awaiting-fix-for-critical-remote-code-execution-bug/
The current version of the popular NumPy library relies on unsafe default usage of a Python module that could lead to remote code execution in the context of the affected application. [...]
https://www.bleepingcomputer.com/news/security/numpy-is-awaiting-fix-for-critical-remote-code-execution-bug/
BleepingComputer
NumPy Is Awaiting Fix for Critical Remote Code Execution Bug
The current version of the popular NumPy library relies on unsafe default usage of a Python module that could lead to remote code execution in the context of the affected application.
Check Point Fixes Privilege Escalation Bug in ZoneAlarm Free
A security issue in Check Point's free edition of ZoneAlarm antivirus and firewall solution allowed a user with limited rights on the machine to inject and execute code with the highest privileges. [...]
https://www.bleepingcomputer.com/news/security/check-point-fixes-privilege-escalation-bug-in-zonealarm-free/
A security issue in Check Point's free edition of ZoneAlarm antivirus and firewall solution allowed a user with limited rights on the machine to inject and execute code with the highest privileges. [...]
https://www.bleepingcomputer.com/news/security/check-point-fixes-privilege-escalation-bug-in-zonealarm-free/
BleepingComputer
Check Point Fixes Privilege Escalation Bug in ZoneAlarm Free
A security issue in Check Point's free edition of ZoneAlarm antivirus and firewall solution allowed a user with limited rights on the machine to inject and execute code with the highest privileges.
Microsoft Adds OneDrive Cloud File Sharing to Skype
Microsoft's Skype communication software now comes with support for seamless file sharing of files stored on the OneDrive cloud platform via a dedicated extension which provides faster and simpler file distribution and team collaboration. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-onedrive-cloud-file-sharing-to-skype/
Microsoft's Skype communication software now comes with support for seamless file sharing of files stored on the OneDrive cloud platform via a dedicated extension which provides faster and simpler file distribution and team collaboration. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-onedrive-cloud-file-sharing-to-skype/
BleepingComputer
Microsoft Adds OneDrive Cloud File Sharing to Skype
Microsoft's Skype communication software now comes with support for seamless file sharing of files stored on the OneDrive cloud platform via a dedicated extension which provides faster and simpler file distribution and team collaboration.
Google Now Publicly Lists Sites Using Chrome Platform Features
Google collects anonymous usage statistics for UseCounter tracked features built into Chrome to see how often they are being used. Google is now also showing the list of web sites that are utilizing these types of features in order to let Chromium developers see how they are being used. [...]
https://www.bleepingcomputer.com/news/google/google-now-publicly-lists-sites-using-chrome-platform-features/
Google collects anonymous usage statistics for UseCounter tracked features built into Chrome to see how often they are being used. Google is now also showing the list of web sites that are utilizing these types of features in order to let Chromium developers see how they are being used. [...]
https://www.bleepingcomputer.com/news/google/google-now-publicly-lists-sites-using-chrome-platform-features/
BleepingComputer
Google Now Publicly Lists Sites Using Chrome Platform Features
Google collects anonymous usage statistics for UseCounter tracked features built into Chrome to see how often they are being used. Google is now also showing the list of web sites that are utilizing these types of features in order to let Chromium developersβ¦
New Ursnif Malware Campaign Uses Fileless Infection to Avoid Detection
A new malware campaign distributing the Ursnif banking Trojan using PowerShell to achieve fileless persistence to hide from anti-malware solutions was detected by Cisco's Advanced Malware Protection Exploit Prevention engine [...]
https://www.bleepingcomputer.com/news/security/new-ursnif-malware-campaign-uses-fileless-infection-to-avoid-detection/
A new malware campaign distributing the Ursnif banking Trojan using PowerShell to achieve fileless persistence to hide from anti-malware solutions was detected by Cisco's Advanced Malware Protection Exploit Prevention engine [...]
https://www.bleepingcomputer.com/news/security/new-ursnif-malware-campaign-uses-fileless-infection-to-avoid-detection/
BleepingComputer
New Ursnif Malware Campaign Uses Fileless Infection to Avoid Detection
A new malware campaign distributing the Ursnif banking Trojan using PowerShell to achieve fileless persistence to hide from anti-malware solutions was detected by Cisco's Advanced Malware Protection Exploit Prevention engine
Drive-By-Download Protection Coming to Google Chrome
Google is in the process of adding support for blocking drive-by downloads originating from website iframes, one of the techniques preferred by attackers behind malvertising campaigns to drop malware payloads on vulnerable machines [...]
https://www.bleepingcomputer.com/news/security/drive-by-download-protection-coming-to-google-chrome/
Google is in the process of adding support for blocking drive-by downloads originating from website iframes, one of the techniques preferred by attackers behind malvertising campaigns to drop malware payloads on vulnerable machines [...]
https://www.bleepingcomputer.com/news/security/drive-by-download-protection-coming-to-google-chrome/
BleepingComputer
Drive-By-Download Protection Coming to Google Chrome
Google is in the process of adding support for blocking drive-by downloads originating from website iframes, one of the techniques preferred by attackers behind malvertising campaigns to drop malware payloads on vulnerable machines
Microsof Office 365 Now Available in the Mac App Store
Microsoft Office 365 was launched today on Apple's Mac App Store allowing macOS users to download and install Microsoft's Word, Outlook, Excel, PowerPoint, OneDrive, and OneNote apps on their Macs, and offering the option to purchase a subscription from within the applications. [...]
https://www.bleepingcomputer.com/news/microsoft/microsof-office-365-now-available-in-the-mac-app-store/
Microsoft Office 365 was launched today on Apple's Mac App Store allowing macOS users to download and install Microsoft's Word, Outlook, Excel, PowerPoint, OneDrive, and OneNote apps on their Macs, and offering the option to purchase a subscription from within the applications. [...]
https://www.bleepingcomputer.com/news/microsoft/microsof-office-365-now-available-in-the-mac-app-store/
BleepingComputer
Microsof Office 365 Now Available in the Mac App Store
Microsoft Office 365 was launched today on Apple's Mac App Store allowing macOS users to download and install Microsoft's Word, Outlook, Excel, PowerPoint, OneDrive, and OneNote apps on their Macs, and offering the option to purchase a subscription from withinβ¦
Windows 10 Insider Build 18323 Released With Light Theme Improvements
Microsoft has released Windows 10 Insider Preview Build 18323 (19H1) to insiders in the Fast ring. This build brings an updated Raw Image Extension, improvements to the Light Theme, and notifications to enable Tamper Protection in Windows Security. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18323-released-with-light-theme-improvements/
Microsoft has released Windows 10 Insider Preview Build 18323 (19H1) to insiders in the Fast ring. This build brings an updated Raw Image Extension, improvements to the Light Theme, and notifications to enable Tamper Protection in Windows Security. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18323-released-with-light-theme-improvements/
BleepingComputer
Windows 10 Insider Build 18323 Released With Light Theme Improvements
Microsoft has released Windows 10 Insider Preview Build 18323 (19H1) to insiders in the Fast ring. This build brings an updated Raw Image Extension, improvements to the Light Theme, and notifications to enable Tamper Protection in Windows Security.
How Reserved Storage Works in the Next Version of Windows 10
When Windows 10 build 1903 is released, it will introduce a new feature called Reserved Storage. As the name suggests, Reserved Storage will automatically allocate a certain amount of storage space that will be used by updates, apps, temporary files, and system caches. [...]
https://www.bleepingcomputer.com/news/microsoft/how-reserved-storage-works-in-the-next-version-of-windows-10/
When Windows 10 build 1903 is released, it will introduce a new feature called Reserved Storage. As the name suggests, Reserved Storage will automatically allocate a certain amount of storage space that will be used by updates, apps, temporary files, and system caches. [...]
https://www.bleepingcomputer.com/news/microsoft/how-reserved-storage-works-in-the-next-version-of-windows-10/
BleepingComputer
How Reserved Storage Works in the Next Version of Windows 10
When Windows 10 build 1903 is released, it will introduce a new feature called Reserved Storage. As the name suggests, Reserved Storage will automatically allocate a certain amount of storage space that will be used by updates, apps, temporary files, andβ¦