Mozilla Adding a Picture-in-Picture Mode to Firefox
Like Chrome, Mozilla Firefox is adding a Picture-in-Picture Mode that allows users to pop the video out of the web page in a stay on top video that they can watch while using other applications. [...]
https://www.bleepingcomputer.com/news/software/mozilla-adding-a-picture-in-picture-mode-to-firefox/
Like Chrome, Mozilla Firefox is adding a Picture-in-Picture Mode that allows users to pop the video out of the web page in a stay on top video that they can watch while using other applications. [...]
https://www.bleepingcomputer.com/news/software/mozilla-adding-a-picture-in-picture-mode-to-firefox/
BleepingComputer
Mozilla Adding a Picture-in-Picture Mode to Firefox
Like Chrome, Mozilla Firefox is adding a Picture-in-Picture Mode that allows users to pop the video out of the web page in a stay on top video that they can watch while using other applications.
2.7 Million Health-Related Calls, Sensitive Info Exposed for Six Years
A server used to store real-time recordings of phone calls made to the 1177 Swedish Healthcare Guide service for health care information was found completely exposed to the Internet, with no user or password to protect it. [...]
https://www.bleepingcomputer.com/news/security/27-million-health-related-calls-sensitive-info-exposed-for-six-years/
A server used to store real-time recordings of phone calls made to the 1177 Swedish Healthcare Guide service for health care information was found completely exposed to the Internet, with no user or password to protect it. [...]
https://www.bleepingcomputer.com/news/security/27-million-health-related-calls-sensitive-info-exposed-for-six-years/
BleepingComputer
2.7 Million Health-Related Calls, Sensitive Info Exposed for Six Years
A server used to store real-time recordings of phone calls made to the 1177 Swedish Healthcare Guide service for health care information was found completely exposed to the Internet, with no user or password to protect it.
State Actor Behind Parliament Breach Says Australian Prime Minister
The computer network of Australia's Federal Parliament has been breached in a cyber attack which targeted the country's major political parties and carried out by a "sophisticated state actor" according to Prime Minister Scott Morrison. [...]
https://www.bleepingcomputer.com/news/security/state-actor-behind-parliament-breach-says-australian-prime-minister/
The computer network of Australia's Federal Parliament has been breached in a cyber attack which targeted the country's major political parties and carried out by a "sophisticated state actor" according to Prime Minister Scott Morrison. [...]
https://www.bleepingcomputer.com/news/security/state-actor-behind-parliament-breach-says-australian-prime-minister/
BleepingComputer
State Actor Behind Parliament Breach Says Australian Prime Minister
The computer network of Australia's Federal Parliament has been breached in a cyber attack which targeted the country's major political parties and carried out by a "sophisticated state actor" according to Prime Minister Scott Morrison.
Multi-Stage Rietspoof Malware Drops Multiple Malicious Payloads
Rietspoof is a new malware family which uses a multi-stage delivery system, is designed to drop multiple payloads on the systems it infects, and that offers very little to no information on what audience it targets. [...]
https://www.bleepingcomputer.com/news/security/multi-stage-rietspoof-malware-drops-multiple-malicious-payloads/
Rietspoof is a new malware family which uses a multi-stage delivery system, is designed to drop multiple payloads on the systems it infects, and that offers very little to no information on what audience it targets. [...]
https://www.bleepingcomputer.com/news/security/multi-stage-rietspoof-malware-drops-multiple-malicious-payloads/
BleepingComputer
Multi-Stage Rietspoof Malware Drops Multiple Malicious Payloads
Rietspoof is a new malware family which uses a multi-stage delivery system, is designed to drop multiple payloads on the systems it infects, and that offers very little to no information on what audience it targets.
Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July
Microsoft announced on its support website that future Windows 7 and Windows Server 2008 updates will require SHA-2 code signing support to be installed starting with July 16, 2019. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-7-and-server-2008-updates-to-require-sha-2-support-starting-july/
Microsoft announced on its support website that future Windows 7 and Windows Server 2008 updates will require SHA-2 code signing support to be installed starting with July 16, 2019. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-7-and-server-2008-updates-to-require-sha-2-support-starting-july/
BleepingComputer
Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July
Microsoft announced on its support website that future Windows 7 and Windows Server 2008 updates will require SHA-2 code signing support to be installed starting with July 16, 2019.
Hackers Use Compromised Banks as Starting Points for Phishing Attacks
Cybercriminals attacking banks and financial organizations use their foothold in a compromised infrastructure to gain access to similar targets in other regions or countries. [...]
https://www.bleepingcomputer.com/news/security/hackers-use-compromised-banks-as-starting-points-for-phishing-attacks/
Cybercriminals attacking banks and financial organizations use their foothold in a compromised infrastructure to gain access to similar targets in other regions or countries. [...]
https://www.bleepingcomputer.com/news/security/hackers-use-compromised-banks-as-starting-points-for-phishing-attacks/
BleepingComputer
Hackers Use Compromised Banks as Starting Points for Phishing Attacks
Cybercriminals attacking banks and financial organizations use their foothold in a compromised infrastructure to gain access to similar targets in other regions or countries.
Linux Subsystem Files Accessible via Explorer in Future Windows 10 Releases
The just-released Windows 10 20H1 Build to the Skip Ahead ring comes with a new feature designed to allow Insiders to access the Windows Subsystem for Linux (WSL) filesystem using the Windows Explorer. [...]
https://www.bleepingcomputer.com/news/microsoft/linux-subsystem-files-accessible-via-explorer-in-future-windows-10-releases/
The just-released Windows 10 20H1 Build to the Skip Ahead ring comes with a new feature designed to allow Insiders to access the Windows Subsystem for Linux (WSL) filesystem using the Windows Explorer. [...]
https://www.bleepingcomputer.com/news/microsoft/linux-subsystem-files-accessible-via-explorer-in-future-windows-10-releases/
BleepingComputer
Linux Subsystem Files Accessible via Explorer in Future Windows 10 Releases
The just-released Windows 10 20H1 Build to the Skip Ahead ring comes with a new feature designed to allow Insiders to access the Windows Subsystem for Linux (WSL) filesystem using the Windows Explorer.
GandCrab Decrypter Available for v5.1, New Variant Already Out
A free file decryption tool is available for users whose computers got infected with the latest confirmed versions of GandCrab. It can unlock data encrypted by versions 4 through 5.1 of the malware, and some earlier releases of the threat. [...]
https://www.bleepingcomputer.com/news/security/gandcrab-decrypter-available-for-v51-new-variant-already-out/
A free file decryption tool is available for users whose computers got infected with the latest confirmed versions of GandCrab. It can unlock data encrypted by versions 4 through 5.1 of the malware, and some earlier releases of the threat. [...]
https://www.bleepingcomputer.com/news/security/gandcrab-decrypter-available-for-v51-new-variant-already-out/
BleepingComputer
GandCrab Decrypter Available for v5.1, New Variant Already Out
A free file decryption tool is available for users whose computers got infected with the latest confirmed versions of GandCrab. It can unlock data encrypted by versions 4 through 5.1 of the malware, and some earlier releases of the threat.
North Korean APT Lazarus Targets Russian Entities with KEYMARBLE Backdoor
Bluenoroff, a subdivision of the North Korean sponsored APT group Lazarus, recently switched its sights to Russian entities as unveiled by a newly discovered campaign which uses malicious Office documents specifically crafted to target Russian organizations. [...]
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/
Bluenoroff, a subdivision of the North Korean sponsored APT group Lazarus, recently switched its sights to Russian entities as unveiled by a newly discovered campaign which uses malicious Office documents specifically crafted to target Russian organizations. [...]
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/
BleepingComputer
North Korean APT Lazarus Targets Russian Entities with KEYMARBLE Backdoor
Bluenoroff, a subdivision of the North Korean sponsored APT group Lazarus, recently switched its sights to Russian entities as unveiled by a newly discovered campaign which uses malicious Office documents specifically crafted to target Russian organizations.
Ukraine Announces Joint Exercises with EU to Fend Off Russian Cyber Threats
Ukraine will organize a number of joint exercises in the near future with the European Union (EU) to develop appropriate response models to possible Russian cyber threats designed to interfere in Ukrainian presidential elections that will be held on March 31 [...]
https://www.bleepingcomputer.com/news/security/ukraine-announces-joint-exercises-with-eu-to-fend-off-russian-cyber-threats/
Ukraine will organize a number of joint exercises in the near future with the European Union (EU) to develop appropriate response models to possible Russian cyber threats designed to interfere in Ukrainian presidential elections that will be held on March 31 [...]
https://www.bleepingcomputer.com/news/security/ukraine-announces-joint-exercises-with-eu-to-fend-off-russian-cyber-threats/
BleepingComputer
Ukraine Announces Joint Exercises with EU to Fend Off Russian Cyber Threats
Ukraine will organize a number of joint exercises in the near future with the European Union (EU) to develop appropriate response models to possible Russian cyber threats designed to interfere in Ukrainian presidential elections that will be held on Marchβ¦
GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards
To mark the fifth year of its Security Bug Bounty program, GitHub announced a number of updates, including an expanded scope with more GitHub products covered, increased reward amounts, and new Legal Safe Harbor terms for full legal protection for researchers. [...]
https://www.bleepingcomputer.com/news/security/github-updates-bug-bounty-program-with-expanded-scope-higher-rewards/
To mark the fifth year of its Security Bug Bounty program, GitHub announced a number of updates, including an expanded scope with more GitHub products covered, increased reward amounts, and new Legal Safe Harbor terms for full legal protection for researchers. [...]
https://www.bleepingcomputer.com/news/security/github-updates-bug-bounty-program-with-expanded-scope-higher-rewards/
BleepingComputer
GitHub Updates Bug Bounty Program with Expanded Scope, Higher Rewards
To mark the fifth year of its Security Bug Bounty program, GitHub announced a number of updates, including an expanded scope with more GitHub products covered, increased reward amounts, and new Legal Safe Harbor terms for full legal protection for researchers.
Cards Used at 137 Restaurants Exposed by Point-of-Sale Breach
North Country Business Products point-of-sale and security solutions provider with roughly 6500 customers around the Midwest has disclosed a data breach which led to the exposure of payment information for clients who used their credit and debit cards at 137 restaurants. [...]
https://www.bleepingcomputer.com/news/security/cards-used-at-137-restaurants-exposed-by-point-of-sale-breach/
North Country Business Products point-of-sale and security solutions provider with roughly 6500 customers around the Midwest has disclosed a data breach which led to the exposure of payment information for clients who used their credit and debit cards at 137 restaurants. [...]
https://www.bleepingcomputer.com/news/security/cards-used-at-137-restaurants-exposed-by-point-of-sale-breach/
BleepingComputer
Cards Used at 137 Restaurants Exposed by Point-of-Sale Breach
North Country Business Products point-of-sale and security solutions provider with roughly 6500 customers around the Midwest has disclosed a data breach which led to the exposure of payment information for clients who used their credit and debit cards atβ¦
Flaw in mIRC App Allows Attackers to Execute Commands Remotely
A vulnerability was discovered in the mIRC application that could allow attackers to execute commands, such as the downloading and installation of malware, on a vulnerable computer. [...]
https://www.bleepingcomputer.com/news/security/flaw-in-mirc-app-allows-attackers-to-execute-commands-remotely/
A vulnerability was discovered in the mIRC application that could allow attackers to execute commands, such as the downloading and installation of malware, on a vulnerable computer. [...]
https://www.bleepingcomputer.com/news/security/flaw-in-mirc-app-allows-attackers-to-execute-commands-remotely/
BleepingComputer
Flaw in mIRC App Allows Attackers to Execute Commands Remotely
A vulnerability was discovered in the mIRC application that could allow attackers to execute commands, such as the downloading and installation of malware, on a vulnerable computer.
Windows 10 Cumulative Update Build 17134.619 Released With Fixes
Windows 10 April 2018 Update Build 17134.619 is now rolling out to the general public with a bunch of new fixes and improvements. Windows 10 KB4487029 (Build 17134.619) includes fixes for Internet Explorer and other core components. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-cumulative-update-build-17134619-released-with-fixes/
Windows 10 April 2018 Update Build 17134.619 is now rolling out to the general public with a bunch of new fixes and improvements. Windows 10 KB4487029 (Build 17134.619) includes fixes for Internet Explorer and other core components. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-cumulative-update-build-17134619-released-with-fixes/
BleepingComputer
Windows 10 Cumulative Update Build 17134.619 Released With Fixes
Windows 10 April 2018 Update Build 17134.619 is now rolling out to the general public with a bunch of new fixes and improvements. Windows 10 KB4487029 (Build 17134.619) includes fixes for Internet Explorer and other core components.
Formjacking Surpasses Ransomware and Cryptojacking as Top Threat of 2018
A new year in review report from Symantec shows that formjacking accompanied by supply chain attacks were the fastest growing threats of 2018, while living-off-the-land (LotL) attacks saw a large boost in adoption from threat actors, with PowerShell scripts usage, for example, seeing a formidable 1000% increase. [...]
https://www.bleepingcomputer.com/news/security/formjacking-surpasses-ransomware-and-cryptojacking-as-top-threat-of-2018/
A new year in review report from Symantec shows that formjacking accompanied by supply chain attacks were the fastest growing threats of 2018, while living-off-the-land (LotL) attacks saw a large boost in adoption from threat actors, with PowerShell scripts usage, for example, seeing a formidable 1000% increase. [...]
https://www.bleepingcomputer.com/news/security/formjacking-surpasses-ransomware-and-cryptojacking-as-top-threat-of-2018/
BleepingComputer
Formjacking Surpasses Ransomware and Cryptojacking as Top Threat of 2018
A new year in review report from Symantec shows that formjacking accompanied by supply chain attacks were the fastest growing threats of 2018, while living-off-the-land (LotL) attacks saw a large boost in adoption from threat actors, with PowerShell scriptsβ¦
JD Finance Android App Caught Storing Screenshots With Banking Info
JD Finance apologized to the users of its Android application on Sunday after one customer found out that screenshots taken of his account on the China Merchants Bank app were being added to the cache of the JD Finance app while it was running in the background. [...]
https://www.bleepingcomputer.com/news/security/jd-finance-android-app-caught-storing-screenshots-with-banking-info/
JD Finance apologized to the users of its Android application on Sunday after one customer found out that screenshots taken of his account on the China Merchants Bank app were being added to the cache of the JD Finance app while it was running in the background. [...]
https://www.bleepingcomputer.com/news/security/jd-finance-android-app-caught-storing-screenshots-with-banking-info/
BleepingComputer
JD Finance Android App Caught Storing Screenshots With Banking Info
JD Finance apologized to the users of its Android application on Sunday after one customer found out that screenshots taken of his account on the China Merchants Bank app were being added to the cache of the JD Finance app while it was running in the background.
New AI-Powered Site Generates Horrific Images of Cats
A new web site called thiscatdoesnotexist.com is using artificial intelligence to create images of cats on the fly. Due to the many variations of a cat's position, their surroundings, and the furniture in the background, many of these pictures look like they are coming straight out of a horror movie. [...]
https://www.bleepingcomputer.com/news/technology/new-ai-powered-site-generates-horrific-images-of-cats/
A new web site called thiscatdoesnotexist.com is using artificial intelligence to create images of cats on the fly. Due to the many variations of a cat's position, their surroundings, and the furniture in the background, many of these pictures look like they are coming straight out of a horror movie. [...]
https://www.bleepingcomputer.com/news/technology/new-ai-powered-site-generates-horrific-images-of-cats/
BleepingComputer
New AI-Powered Site Generates Horrific Images of Cats
A new web site called thiscatdoesnotexist.com is using artificial intelligence to create images of cats on the fly. Due to the many variations of a cat's position, their surroundings, and the furniture in the background, many of these pictures look like theyβ¦
Windows 10 Insider Preview Build 18342 Released With Numerous Improvements
Microsoft has released Windows 10 Insider Preview Build 18342 (19H1) to Insiders in the Fast ring. This build adds numerous Windows Sandbox fixes, changes to gaming, and the ability to access WSL files in File Explorer. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-preview-build-18342-released-with-numerous-improvements/
Microsoft has released Windows 10 Insider Preview Build 18342 (19H1) to Insiders in the Fast ring. This build adds numerous Windows Sandbox fixes, changes to gaming, and the ability to access WSL files in File Explorer. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-preview-build-18342-released-with-numerous-improvements/
BleepingComputer
Windows 10 Insider Preview Build 18342 Released With Numerous Improvements
Microsoft has released Windows 10 Insider Preview Build 18342 (19H1) to Insiders in the Fast ring. This build adds numerous Windows Sandbox fixes, changes to gaming, and the ability to access WSL files in File Explorer.
New Attack Kit Combines Trojans and Tools to Spread Miners, Steal Data
A new malware-powered attack kit that stitches up two Trojans and a coinminer to mine for data and Monero was observed while scanning for vulnerable machines from China, Taiwan, Italy, and Hong Kong, and spreading itself over the Internet and on local area networks. [...]
https://www.bleepingcomputer.com/news/security/new-attack-kit-combines-trojans-and-tools-to-spread-miners-steal-data/
A new malware-powered attack kit that stitches up two Trojans and a coinminer to mine for data and Monero was observed while scanning for vulnerable machines from China, Taiwan, Italy, and Hong Kong, and spreading itself over the Internet and on local area networks. [...]
https://www.bleepingcomputer.com/news/security/new-attack-kit-combines-trojans-and-tools-to-spread-miners-steal-data/
BleepingComputer
New Attack Kit Combines Trojans and Tools to Spread Miners, Steal Data
A new malware-powered attack kit that stitches up two Trojans and a coinminer to mine for data and Monero was observed while scanning for vulnerable machines from China, Taiwan, Italy, and Hong Kong, and spreading itself over the Internet and on local areaβ¦
Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash
Microsoft's Edge web browser comes with a hidden whitelist file designed to allow Facebook to circumvent the built-in click-to-play security policy to autorun Flash content without having to ask for user consent. [...]
https://www.bleepingcomputer.com/news/security/microsoft-edge-secret-whitelist-allows-facebook-to-autorun-flash/
Microsoft's Edge web browser comes with a hidden whitelist file designed to allow Facebook to circumvent the built-in click-to-play security policy to autorun Flash content without having to ask for user consent. [...]
https://www.bleepingcomputer.com/news/security/microsoft-edge-secret-whitelist-allows-facebook-to-autorun-flash/
BleepingComputer
Microsoft Edge Secret Whitelist Allows Facebook to Autorun Flash
Microsoft's Edge web browser comes with a hidden whitelist file designed to allow Facebook to circumvent the built-in click-to-play security policy to autorun Flash content without having to ask for user consent.
Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On
Firefox Monitor is a Mozilla service that has partnered with Have I been Pwned to alert users when their email address has been discovered in a data breach. In the past, Firefox Monitor was a standalone service, but starting in Firefox 67 it will now be included as an extension. [...]
https://www.bleepingcomputer.com/news/software/mozilla-firefox-67-to-warn-about-breached-sites-using-new-add-on/
Firefox Monitor is a Mozilla service that has partnered with Have I been Pwned to alert users when their email address has been discovered in a data breach. In the past, Firefox Monitor was a standalone service, but starting in Firefox 67 it will now be included as an extension. [...]
https://www.bleepingcomputer.com/news/software/mozilla-firefox-67-to-warn-about-breached-sites-using-new-add-on/
BleepingComputer
Mozilla Firefox 67 to Warn About Breached Sites Using New Add-On
Firefox Monitor is a Mozilla service that has partnered with Have I been Pwned to alert users when their email address has been discovered in a data breach. In the past, Firefox Monitor was a standalone service, but starting in Firefox 67 it will now be includedβ¦