Microsoft Sees 250% Phishing Increase, Malware Decline by 34%
Phishing attacks have seen an impressive 250% increase between January and December 2018, with attackers moving to multiple points of attacks during the same campaign, switching between malicious URLs, domains, and malware ridden attachments. [...]
https://www.bleepingcomputer.com/news/security/microsoft-sees-250-percent-phishing-increase-malware-decline-by-34-percent/
Phishing attacks have seen an impressive 250% increase between January and December 2018, with attackers moving to multiple points of attacks during the same campaign, switching between malicious URLs, domains, and malware ridden attachments. [...]
https://www.bleepingcomputer.com/news/security/microsoft-sees-250-percent-phishing-increase-malware-decline-by-34-percent/
BleepingComputer
Microsoft Sees 250% Phishing Increase, Malware Decline by 34%
Phishing attacks have seen an impressive 250% increase between January and December 2018, with attackers moving to multiple points of attacks during the same campaign, switching between malicious URLs, domains, and malware ridden attachments.
Windows 10 May Soon Run on the Nintendo Switch
Using a custom UEFI firmware, a Windows driver and UEFI developer is getting closer to installing Windows 10 on a Nintendo Switch. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-may-soon-run-on-the-nintendo-switch/
Using a custom UEFI firmware, a Windows driver and UEFI developer is getting closer to installing Windows 10 on a Nintendo Switch. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-may-soon-run-on-the-nintendo-switch/
BleepingComputer
Windows 10 May Soon Run on the Nintendo Switch
Using a custom UEFI firmware, a Windows driver and UEFI developer is getting closer to installing Windows 10 on a Nintendo Switch.
Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns
Hundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc vulnerability discovered last month. [...]
https://www.bleepingcomputer.com/news/security/vulnerable-docker-hosts-actively-abused-in-cryptojacking-campaigns/
Hundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc vulnerability discovered last month. [...]
https://www.bleepingcomputer.com/news/security/vulnerable-docker-hosts-actively-abused-in-cryptojacking-campaigns/
BleepingComputer
Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns
Hundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc vulnerability discovered last month.
CryptoMix Clop Ransomware Says It's Targeting Networks, Not Computers
A new CryptoMix Ransomware variant has been discovered that appends the .CLOP or .CIOP extension to encrypted files. Of particular interest, is that this variant is now indicating that the attackers are targeting entire networks rather than individual computers. [...]
https://www.bleepingcomputer.com/news/security/cryptomix-clop-ransomware-says-its-targeting-networks-not-computers/
A new CryptoMix Ransomware variant has been discovered that appends the .CLOP or .CIOP extension to encrypted files. Of particular interest, is that this variant is now indicating that the attackers are targeting entire networks rather than individual computers. [...]
https://www.bleepingcomputer.com/news/security/cryptomix-clop-ransomware-says-its-targeting-networks-not-computers/
BleepingComputer
CryptoMix Clop Ransomware Says It's Targeting Networks, Not Computers
A new CryptoMix Ransomware variant has been discovered that appends the .CLOP or .CIOP extension to encrypted files. Of particular interest, is that this variant is now indicating that the attackers are targeting entire networks rather than individual computers.
Boost Windows 10 Performance with Retpoline Spectre Mitigation
If you are using older Intel processors or AMD processors, you can boost the performance of Windows 10 by enabling the Retpoline Spectre mitigations that were recently ported to Windows 10 October 2018 Update build 1809. [...]
https://www.bleepingcomputer.com/news/security/boost-windows-10-performance-with-retpoline-spectre-mitigation/
If you are using older Intel processors or AMD processors, you can boost the performance of Windows 10 by enabling the Retpoline Spectre mitigations that were recently ported to Windows 10 October 2018 Update build 1809. [...]
https://www.bleepingcomputer.com/news/security/boost-windows-10-performance-with-retpoline-spectre-mitigation/
BleepingComputer
Boost Windows 10 Performance with Retpoline Spectre Mitigation
If you are using older Intel processors or AMD processors, you can boost the performance of Windows 10 by enabling the Retpoline Spectre mitigations that were recently ported to Windows 10 October 2018 Update build 1809.
Screenshots of Microsoftβs Chromium-Based Edge Browser Leaked Online
Screenshots of Microsoft's in-house Edge Chromium-based web browser have leaked online, showing the large amounts of user interface DNA the two browsers share with each other and providing details on a future Microsoft Edge Store. [...]
https://www.bleepingcomputer.com/news/microsoft/screenshots-of-microsoft-s-chromium-based-edge-browser-leaked-online/
Screenshots of Microsoft's in-house Edge Chromium-based web browser have leaked online, showing the large amounts of user interface DNA the two browsers share with each other and providing details on a future Microsoft Edge Store. [...]
https://www.bleepingcomputer.com/news/microsoft/screenshots-of-microsoft-s-chromium-based-edge-browser-leaked-online/
BleepingComputer
Screenshots of Microsoftβs Chromium-Based Edge Browser Leaked Online
Screenshots of Microsoft's in-house Edge Chromium-based web browser have leaked online, showing the large amounts of user interface DNA the two browsers share with each other and providing details on a future Microsoft Edge Store.
Microsoft Releases Windows 10 Build 18351 (19H1) With Only Bug Fixes
Microsoft has released Windows 10 Insider Preview Build 18351 for Insiders in the Fast ring. As the 19H1 builds move closer to being released, we should expect to see only bug fixes and no new major features being added to this development branch. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-build-18351-19h1-with-only-bug-fixes/
Microsoft has released Windows 10 Insider Preview Build 18351 for Insiders in the Fast ring. As the 19H1 builds move closer to being released, we should expect to see only bug fixes and no new major features being added to this development branch. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-build-18351-19h1-with-only-bug-fixes/
BleepingComputer
Microsoft Releases Windows 10 Build 18351 (19H1) With Only Bug Fixes
Microsoft has released Windows 10 Insider Preview Build 18351 for Insiders in the Fast ring. As the 19H1 builds move closer to being released, we should expect to see only bug fixes and no new major features being added to this development branch.
Jokeroo Ransomware-as-a-Service Offers Multiple Membership Packages
A new Ransomware-as-a-Service called Jokeroo is being promoted on underground hacking sites and via Twitter that allows affiliates to allegedly gain access to a fully functional ransomware and payment server. [...]
https://www.bleepingcomputer.com/news/security/jokeroo-ransomware-as-a-service-offers-multiple-membership-packages/
A new Ransomware-as-a-Service called Jokeroo is being promoted on underground hacking sites and via Twitter that allows affiliates to allegedly gain access to a fully functional ransomware and payment server. [...]
https://www.bleepingcomputer.com/news/security/jokeroo-ransomware-as-a-service-offers-multiple-membership-packages/
BleepingComputer
Jokeroo Ransomware-as-a-Service Offers Multiple Membership Packages
A new Ransomware-as-a-Service called Jokeroo is being promoted on underground hacking sites and via Twitter that allows affiliates to allegedly gain access to a fully functional ransomware and payment server.
Malicious Mobile Software Attacks Almost Doubled in 2018
Mobile users have been targeted by almost twice as many attacks using malicious software during 2018, going up from 66.4 million in 2017 events detected during 2017 to 116.5 million until the end of last year according to a report by Kaspersky Lab. [...]
https://www.bleepingcomputer.com/news/security/malicious-mobile-software-attacks-almost-doubled-in-2018/
Mobile users have been targeted by almost twice as many attacks using malicious software during 2018, going up from 66.4 million in 2017 events detected during 2017 to 116.5 million until the end of last year according to a report by Kaspersky Lab. [...]
https://www.bleepingcomputer.com/news/security/malicious-mobile-software-attacks-almost-doubled-in-2018/
BleepingComputer
Malicious Mobile Software Attacks Almost Doubled in 2018
Mobile users have been targeted by almost twice as many attacks using malicious software during 2018, going up from 66.4 million in 2017 events detected during 2017 to 116.5 million until the end of last year according to a report by Kaspersky Lab.
Cloudflare Deploys Firewall Rule to Block New Drupal Exploits
Exploitation attempts of a highly critical vulnerability discovered in the Drupal content management software (CMS) on February 20 were blocked by Cloudfare using Web Application Firewall (WAF) rules designed to protect its customers' websites from being compromised. [...]
https://www.bleepingcomputer.com/news/security/cloudflare-deploys-firewall-rule-to-block-new-drupal-exploits/
Exploitation attempts of a highly critical vulnerability discovered in the Drupal content management software (CMS) on February 20 were blocked by Cloudfare using Web Application Firewall (WAF) rules designed to protect its customers' websites from being compromised. [...]
https://www.bleepingcomputer.com/news/security/cloudflare-deploys-firewall-rule-to-block-new-drupal-exploits/
BleepingComputer
Cloudflare Deploys Firewall Rule to Block New Drupal Exploits
Exploitation attempts of a highly critical vulnerability discovered in the Drupal content management software (CMS) on February 20 were blocked by Cloudfare using Web Application Firewall (WAF) rules designed to protect its customers' websites from beingβ¦
Adware Apps in Google Play Simulate Uninstall for Persistence
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time. They pose as camera-related utilities and have recorded over 700,000 installations, combined. [...]
https://www.bleepingcomputer.com/news/security/adware-apps-in-google-play-simulate-uninstall-for-persistence/
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time. They pose as camera-related utilities and have recorded over 700,000 installations, combined. [...]
https://www.bleepingcomputer.com/news/security/adware-apps-in-google-play-simulate-uninstall-for-persistence/
BleepingComputer
Adware Apps in Google Play Simulate Uninstall for Persistence
Three adware apps discovered in Google Play use a special trick to ensure they stay on the victim device for a longer time. They pose as camera-related utilities and have recorded over 700,000 installations, combined.
Hackers Revive Microsoft Office Equation Editor Exploit
Hackers used specially-crafted Microsoft Word documents during the last few months to abuse an Integer Overflow bug that helped them bypass sandbox and anti-malware solutions and exploit the Microsoft Office Equation Editor vulnerability patched 15 months ago. [...]
https://www.bleepingcomputer.com/news/security/hackers-revive-microsoft-office-equation-editor-exploit/
Hackers used specially-crafted Microsoft Word documents during the last few months to abuse an Integer Overflow bug that helped them bypass sandbox and anti-malware solutions and exploit the Microsoft Office Equation Editor vulnerability patched 15 months ago. [...]
https://www.bleepingcomputer.com/news/security/hackers-revive-microsoft-office-equation-editor-exploit/
BleepingComputer
Hackers Revive Microsoft Office Equation Editor Exploit
Hackers used specially-crafted Microsoft Word documents during the last few months to abuse an Integer Overflow bug that helped them bypass sandbox and anti-malware solutions and exploit the Microsoft Office Equation Editor vulnerability patched 15 monthsβ¦
NSA's Ghidra Reverse Engineering Framework Stirs Up Malware Researchers
The National Security Agency released a free, public version of Ghidra, a set of tools developed internally for software reverse engineering. The agency will also release Ghidra's source code, allowing users to improve the framework's feature set and turn it into a more effective tool. [...]
https://www.bleepingcomputer.com/news/security/nsas-ghidra-reverse-engineering-framework-stirs-up-malware-researchers/
The National Security Agency released a free, public version of Ghidra, a set of tools developed internally for software reverse engineering. The agency will also release Ghidra's source code, allowing users to improve the framework's feature set and turn it into a more effective tool. [...]
https://www.bleepingcomputer.com/news/security/nsas-ghidra-reverse-engineering-framework-stirs-up-malware-researchers/
BleepingComputer
NSA's Ghidra Reverse Engineering Framework Stirs Up Malware Researchers
The National Security Agency released a free, public version of Ghidra, a set of tools developed internally for software reverse engineering. The agency will also release Ghidra's source code, allowing users to improve the framework's feature set and turnβ¦
Google Chrome Update Patches Zero-Day Actively Exploited in the Wild
Google updated the release announcement for the Chrome web browser version 72.0.3626.121 with a warning that the 0day patched in the release is being actively exploited in the wild. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-update-patches-zero-day-actively-exploited-in-the-wild/
Google updated the release announcement for the Chrome web browser version 72.0.3626.121 with a warning that the 0day patched in the release is being actively exploited in the wild. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-update-patches-zero-day-actively-exploited-in-the-wild/
BleepingComputer
Google Chrome Update Patches Zero-Day Actively Exploited in the Wild
Google updated the release announcement for the Chrome web browser version 72.0.3626.121 with a warning that the 0day patched in the release is being actively exploited in the wild.
Microsoft Open Sources the Windows 10 Calculator on GitHub
Have you ever wanted to know exactly how the Windows 10 Calculator works or want to extend its functionality? Now you can, as Microsoft has open-sourced their Windows Calculator so that anyone can play with it. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-open-sources-the-windows-10-calculator-on-github/
Have you ever wanted to know exactly how the Windows 10 Calculator works or want to extend its functionality? Now you can, as Microsoft has open-sourced their Windows Calculator so that anyone can play with it. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-open-sources-the-windows-10-calculator-on-github/
BleepingComputer
Microsoft Open Sources the Windows 10 Calculator on GitHub
Have you ever wanted to know exactly how the Windows 10 Calculator works or want to extend its functionality? Now you can, as Microsoft has open-sourced their Windows Calculator so that anyone can play with it.
Microsoft Releases Windows 10 Build 18850 (20H1) to Skip Ahead Users
Microsoft has released Windows 10 Insider Preview Build 18850 for Insiders in the Skip Ahead ring. This 20H1 build includes a new version of Snip and Sketch (v10.1901.10521.0) and various bug fixes [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-build-18850-20h1-to-skip-ahead-users/
Microsoft has released Windows 10 Insider Preview Build 18850 for Insiders in the Skip Ahead ring. This 20H1 build includes a new version of Snip and Sketch (v10.1901.10521.0) and various bug fixes [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-build-18850-20h1-to-skip-ahead-users/
BleepingComputer
Microsoft Releases Windows 10 Build 18850 (20H1) to Skip Ahead Users
Microsoft has released Windows 10 Insider Preview Build 18850 for Insiders in the Skip Ahead ring. This 20H1 build includes a new version of Snip and Sketch (v10.1901.10521.0) and various bug fixes
StealthWorker Malware Uses Windows, Linux Bots to Hack Websites
Hackers are running a new campaign which drops the StealthWorker brute-force malware on Windows and Linux machines that end up being used to brute force other computers in a series of distributed brute force attacks. [...]
https://www.bleepingcomputer.com/news/security/stealthworker-malware-uses-windows-linux-bots-to-hack-websites/
Hackers are running a new campaign which drops the StealthWorker brute-force malware on Windows and Linux machines that end up being used to brute force other computers in a series of distributed brute force attacks. [...]
https://www.bleepingcomputer.com/news/security/stealthworker-malware-uses-windows-linux-bots-to-hack-websites/
BleepingComputer
StealthWorker Malware Uses Windows, Linux Bots to Hack Websites
Hackers are running a new campaign which drops the StealthWorker brute-force malware on Windows and Linux machines that end up being used to brute force other computers in a series of distributed brute force attacks.
Unpatched UPnP-Enabled Devices Left Exposed to Attacks
Outdated software on UPnP-enabled devices exposes them to attacks designed to exploit a wide range of vulnerabilities found in UPnP libraries used by various daemons and servers reachable over the Internet. [...]
https://www.bleepingcomputer.com/news/security/unpatched-upnp-enabled-devices-left-exposed-to-attacks/
Outdated software on UPnP-enabled devices exposes them to attacks designed to exploit a wide range of vulnerabilities found in UPnP libraries used by various daemons and servers reachable over the Internet. [...]
https://www.bleepingcomputer.com/news/security/unpatched-upnp-enabled-devices-left-exposed-to-attacks/
BleepingComputer
Unpatched UPnP-Enabled Devices Left Exposed to Attacks
Outdated software on UPnP-enabled devices exposes them to attacks designed to exploit a wide range of vulnerabilities found in UPnP libraries used by various daemons and servers reachable over the Internet.
12,449 Data Breaches Confirmed in 2018, a 424% Increase Over the Previous Year
The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China. [...]
https://www.bleepingcomputer.com/news/security/12-449-data-breaches-confirmed-in-2018-a-424-percent-increase-over-the-previous-year/
The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China. [...]
https://www.bleepingcomputer.com/news/security/12-449-data-breaches-confirmed-in-2018-a-424-percent-increase-over-the-previous-year/
BleepingComputer
12,449 Data Breaches Confirmed in 2018, a 424% Increase Over the Previous Year
The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China.
#Opfail: Phisher Attaches Powershell Exec Instead of Malware
The security community has seen its share of mistakes made by cybercriminals, and quickly took advantage of them to stop the threat. But some of them have reached blooper level. [...]
https://www.bleepingcomputer.com/news/security/opfail-phisher-attaches-powershell-exec-instead-of-malware/
The security community has seen its share of mistakes made by cybercriminals, and quickly took advantage of them to stop the threat. But some of them have reached blooper level. [...]
https://www.bleepingcomputer.com/news/security/opfail-phisher-attaches-powershell-exec-instead-of-malware/
BleepingComputer
#Opfail: Phisher Attaches Powershell Exec Instead of Malware
The security community has seen its share of mistakes made by cybercriminals, and quickly took advantage of them to stop the threat. But some of them have reached blooper level.
FTC Issue PSA on Social Security Number Scams
Scammers pretending to be employees of the Social Security Administrations (SSA) have caused last year losses of at least $16.6 million. [...]
https://www.bleepingcomputer.com/news/security/ftc-issue-psa-on-social-security-number-scams/
Scammers pretending to be employees of the Social Security Administrations (SSA) have caused last year losses of at least $16.6 million. [...]
https://www.bleepingcomputer.com/news/security/ftc-issue-psa-on-social-security-number-scams/
BleepingComputer
FTC Issue PSA on Social Security Number Scams
Scammers pretending to be employees of the Social Security Administrations (SSA) have caused last year losses of at least $16.6 million.