UK Announces Introduction of Online Pornography Age Checks in July
UK's government announced today that new age-verification checks will be put into place to prevent Internet users under the age of 18 to access and watch online pornography starting with July 15. [...]
https://www.bleepingcomputer.com/news/security/uk-announces-introduction-of-online-pornography-age-checks-in-july/
UK's government announced today that new age-verification checks will be put into place to prevent Internet users under the age of 18 to access and watch online pornography starting with July 15. [...]
https://www.bleepingcomputer.com/news/security/uk-announces-introduction-of-online-pornography-age-checks-in-july/
BleepingComputer
UK Announces Introduction of Online Pornography Age Checks in July
UK's government announced today that new age-verification checks will be put into place to prevent Internet users under the age of 18 to access and watch online pornography starting with July 15.
Navicent Health Data Breach Exposes Patient's Personal Info
Navicent Health announed today that they suffered a data breach through unauthorized access to their email systems. This breach has exposed the personal information of patients, with some emails containing social security numbers. [...]
https://www.bleepingcomputer.com/news/security/navicent-health-data-breach-exposes-patients-personal-info/
Navicent Health announed today that they suffered a data breach through unauthorized access to their email systems. This breach has exposed the personal information of patients, with some emails containing social security numbers. [...]
https://www.bleepingcomputer.com/news/security/navicent-health-data-breach-exposes-patients-personal-info/
BleepingComputer
Navicent Health Data Breach Exposes Patient's Personal Info
Navicent Health announed today that they suffered a data breach through unauthorized access to their email systems. This breach has exposed the personal information of patients, with some emails containing social security numbers.
Malicious AutoHotkey Scripts Used to Steal Info, Remotely Access Systems
Attackers are targeting potential victims using a malicious AutoHotkey script to avoid detection and to steal information, to drop more payloads, and to remotely access compromised machines using TeamViewerββββββ. [...]
https://www.bleepingcomputer.com/news/security/malicious-autohotkey-scripts-used-to-steal-info-remotely-access-systems/
Attackers are targeting potential victims using a malicious AutoHotkey script to avoid detection and to steal information, to drop more payloads, and to remotely access compromised machines using TeamViewerββββββ. [...]
https://www.bleepingcomputer.com/news/security/malicious-autohotkey-scripts-used-to-steal-info-remotely-access-systems/
BleepingComputer
Malicious AutoHotkey Scripts Used to Steal Info, Remotely Access Systems
Attackers are targeting potential victims using a malicious AutoHotkey script to avoid detection and to steal information, to drop more payloads, and to remotely access compromised machines using TeamViewerββββββ.
Evernote Fixes Remote Code Execution Vulnerability in macOS App
A local file path traversal vulnerability which allows attackers to run arbitrary code on their targets' Macs remotely was fixed by Evernote after receiving a report from security researcher Dhiraj Mishra. [...]
https://www.bleepingcomputer.com/news/security/evernote-fixes-remote-code-execution-vulnerability-in-macos-app/
A local file path traversal vulnerability which allows attackers to run arbitrary code on their targets' Macs remotely was fixed by Evernote after receiving a report from security researcher Dhiraj Mishra. [...]
https://www.bleepingcomputer.com/news/security/evernote-fixes-remote-code-execution-vulnerability-in-macos-app/
BleepingComputer
Evernote Fixes Remote Code Execution Vulnerability in macOS App
A local file path traversal vulnerability which allows attackers to run arbitrary code on their targets' Macs remotely was fixed by Evernote after receiving a report from security researcher Dhiraj Mishra.
Microsoft Edge File Permissions Clash with IE, Allow XXE Attacks
A recently disclosed vulnerability affecting Internet Explorer yet to receive a fix from Microsoft has received a micropatch that denies remote attackers the possibility to exfiltrate local files and run reconnaissance activity on the system. [...]
https://www.bleepingcomputer.com/news/security/microsoft-edge-file-permissions-clash-with-ie-allow-xxe-attacks/
A recently disclosed vulnerability affecting Internet Explorer yet to receive a fix from Microsoft has received a micropatch that denies remote attackers the possibility to exfiltrate local files and run reconnaissance activity on the system. [...]
https://www.bleepingcomputer.com/news/security/microsoft-edge-file-permissions-clash-with-ie-allow-xxe-attacks/
BleepingComputer
Microsoft Edge File Permissions Clash with IE, Allow XXE Attacks
A recently disclosed vulnerability affecting Internet Explorer yet to receive a fix from Microsoft has received a micropatch that denies remote attackers the possibility to exfiltrate local files and run reconnaissance activity on the system.
Instagram Only Showing a Blank White Screen for Many Users
Since yesterday, users have been reporting that they are greeted with a blank or white screen when they open the Instagram app or try to log into their account. [...]
https://www.bleepingcomputer.com/news/software/instagram-only-showing-a-blank-white-screen-for-many-users/
Since yesterday, users have been reporting that they are greeted with a blank or white screen when they open the Instagram app or try to log into their account. [...]
https://www.bleepingcomputer.com/news/software/instagram-only-showing-a-blank-white-screen-for-many-users/
BleepingComputer
Instagram Only Showing a Blank White Screen for Many Users
Since yesterday, users have been reporting that they are greeted with a blank or white screen when they open the Instagram app or try to log into their account.
Broadcom WiFi Driver Flaws Expose Computers, Phones, IoT to RCE Attacks
Broadcom WiFi chipset drivers have been found to contain vulnerabilities impacting multiple operating systems and allowing potential attackers to remotely execute arbitrary code and to trigger denial-of-service according to a DHS/CISA alert and a CERT/CC vulnerability note. [...]
https://www.bleepingcomputer.com/news/security/broadcom-wifi-driver-flaws-expose-computers-phones-iot-to-rce-attacks/
Broadcom WiFi chipset drivers have been found to contain vulnerabilities impacting multiple operating systems and allowing potential attackers to remotely execute arbitrary code and to trigger denial-of-service according to a DHS/CISA alert and a CERT/CC vulnerability note. [...]
https://www.bleepingcomputer.com/news/security/broadcom-wifi-driver-flaws-expose-computers-phones-iot-to-rce-attacks/
BleepingComputer
Broadcom WiFi Driver Flaws Expose Computers, Phones, IoT to RCE Attacks
Broadcom WiFi chipset drivers have been found to contain vulnerabilities impacting multiple operating systems and allowing potential attackers to remotely execute arbitrary code and to trigger denial-of-service according to a DHS/CISA alert and a CERT/CCβ¦
'Sea Turtle' Campaign Focuses on DNS Hijacking to Compromise Targets
For at least two years, a highly capable threat actor has been running a campaign that relied on DNS hijacking to reach their targets. In the operation, at least 40 public and private organizations in 13 countries have been compromised. [...]
https://www.bleepingcomputer.com/news/security/sea-turtle-campaign-focuses-on-dns-hijacking-to-compromise-targets/
For at least two years, a highly capable threat actor has been running a campaign that relied on DNS hijacking to reach their targets. In the operation, at least 40 public and private organizations in 13 countries have been compromised. [...]
https://www.bleepingcomputer.com/news/security/sea-turtle-campaign-focuses-on-dns-hijacking-to-compromise-targets/
BleepingComputer
'Sea Turtle' Campaign Focuses on DNS Hijacking to Compromise Targets
For at least two years, a highly capable threat actor has been running a campaign that relied on DNS hijacking to reach their targets. In the operation, at least 40 public and private organizations in 13 countries have been compromised.
DLL Cryptomix Ransomware Variant Installed Via Remote Desktop
The CryptoMix ransomware is still alive and kicking as a new variant has been spotted being spread in the wild. This new version appends the .DLL extension to encrypted files and is said to be installed through hacked remote desktop services. [...]
https://www.bleepingcomputer.com/news/security/dll-cryptomix-ransomware-variant-installed-via-remote-desktop/
The CryptoMix ransomware is still alive and kicking as a new variant has been spotted being spread in the wild. This new version appends the .DLL extension to encrypted files and is said to be installed through hacked remote desktop services. [...]
https://www.bleepingcomputer.com/news/security/dll-cryptomix-ransomware-variant-installed-via-remote-desktop/
BleepingComputer
DLL Cryptomix Ransomware Variant Installed Via Remote Desktop
The CryptoMix ransomware is still alive and kicking as a new variant has been spotted being spread in the wild. This new version appends the .DLL extension to encrypted files and is said to be installed through hacked remote desktop services.
Hacker Group Exposes Iranian APT Operations and Members
Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government. [...]
https://www.bleepingcomputer.com/news/security/hacker-group-exposes-iranian-apt-operations-and-members/
Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government. [...]
https://www.bleepingcomputer.com/news/security/hacker-group-exposes-iranian-apt-operations-and-members/
BleepingComputer
Hacker Group Exposes Iranian APT Operations and Members
Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government.
RevengeRAT Distributed via Bit.ly, BlogSpot, and Pastebin C2 Infrastructure
A malicious campaign targeting entities from North America, Europe, Asia, and the Middle East during March used a combination of pages hosted on Bit.ly, BlogSpot, and Pastebin to create a command-and-control (C2) infrastructure designed to avoid getting blocked by security solutions. [...]
https://www.bleepingcomputer.com/news/security/revengerat-distributed-via-bitly-blogspot-and-pastebin-c2-infrastructure/
A malicious campaign targeting entities from North America, Europe, Asia, and the Middle East during March used a combination of pages hosted on Bit.ly, BlogSpot, and Pastebin to create a command-and-control (C2) infrastructure designed to avoid getting blocked by security solutions. [...]
https://www.bleepingcomputer.com/news/security/revengerat-distributed-via-bitly-blogspot-and-pastebin-c2-infrastructure/
BleepingComputer
RevengeRAT Distributed via Bit.ly, BlogSpot, and Pastebin C2 Infrastructure
A malicious campaign targeting entities from North America, Europe, Asia, and the Middle East during March used a combination of pages hosted on Bit.ly, BlogSpot, and Pastebin to create a command-and-control (C2) infrastructure designed to avoid getting blockedβ¦
Windows 10 Application Guard Added to the New Microsoft Edge
Microsoft's Windows Defender Application Guard has been added to the upcoming Chromium-based Microsoft Edge. This security feature allows you to securely browse the web without fear of becoming infected by malicious sites. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-application-guard-added-to-the-new-microsoft-edge/
Microsoft's Windows Defender Application Guard has been added to the upcoming Chromium-based Microsoft Edge. This security feature allows you to securely browse the web without fear of becoming infected by malicious sites. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-application-guard-added-to-the-new-microsoft-edge/
BleepingComputer
Windows 10 Application Guard Added to the New Microsoft Edge
Microsoft's Windows Defender Application Guard has been added to the upcoming Chromium-based Microsoft Edge. This security feature allows you to securely browse the web without fear of becoming infected by malicious sites.
Ride-Hailing Company Exposes Sensitive Info of Iranian Drivers
A ride-hailing company operating in Iran left open and publicly available a database containing sensitive information about its drivers. In total, the MongoDB instance stored over 6.7 million records. [...]
https://www.bleepingcomputer.com/news/security/ride-hailing-company-exposes-sensitive-info-of-iranian-drivers/
A ride-hailing company operating in Iran left open and publicly available a database containing sensitive information about its drivers. In total, the MongoDB instance stored over 6.7 million records. [...]
https://www.bleepingcomputer.com/news/security/ride-hailing-company-exposes-sensitive-info-of-iranian-drivers/
BleepingComputer
Ride-Hailing Company Exposes Sensitive Info of Iranian Drivers
A ride-hailing company operating in Iran left open and publicly available a database containing sensitive information about its drivers. In total, the MongoDB instance stored over 6.7 million records.
Unsecured Databases Leak 60 Million Records of Scraped LinkedIn Data
Eight unsecured databases were found leaking approximately 60 million records of LinkedIn user information. While most of the information is publicly available, the databases contain the email addresses of the LinkedIn users. [...]
https://www.bleepingcomputer.com/news/security/unsecured-databases-leak-60-million-records-of-scraped-linkedin-data/
Eight unsecured databases were found leaking approximately 60 million records of LinkedIn user information. While most of the information is publicly available, the databases contain the email addresses of the LinkedIn users. [...]
https://www.bleepingcomputer.com/news/security/unsecured-databases-leak-60-million-records-of-scraped-linkedin-data/
BleepingComputer
Unsecured Databases Leak 60 Million Records of Scraped LinkedIn Data
Eight unsecured databases were found leaking approximately 60 million records of LinkedIn user information. While most of the information is publicly available, the databases contain the email addresses of the LinkedIn users.
Get Assassin's Creed: Unity for Free in Honor of Notre-Dame
French video game developer Ubisoft is giving away Assassins Creed: Unity for free in honor of the Notre-Dame, which was recently damaged due to a fire. [...]
https://www.bleepingcomputer.com/news/gaming/get-assassins-creed-unity-for-free-in-honor-of-notre-dame/
French video game developer Ubisoft is giving away Assassins Creed: Unity for free in honor of the Notre-Dame, which was recently damaged due to a fire. [...]
https://www.bleepingcomputer.com/news/gaming/get-assassins-creed-unity-for-free-in-honor-of-notre-dame/
BleepingComputer
Get Assassin's Creed: Unity for Free in Honor of Notre-Dame
French video game developer Ubisoft is giving away Assassins Creed: Unity for free in honor of the Notre-Dame, which was recently damaged due to a fire.
Cyber Attack Forces The Weather Channel Off the Air
The Weather Channel stopped its live broadcasting this morning due to a security incident that lasted for at least 90 minutes. [...]
https://www.bleepingcomputer.com/news/security/cyber-attack-forces-the-weather-channel-off-the-air/
The Weather Channel stopped its live broadcasting this morning due to a security incident that lasted for at least 90 minutes. [...]
https://www.bleepingcomputer.com/news/security/cyber-attack-forces-the-weather-channel-off-the-air/
BleepingComputer
Cyber Attack Forces The Weather Channel Off the Air
The Weather Channel stopped its live broadcasting this morning due to a security incident that lasted for at least 90 minutes.
The HotList is The Latest Instagram Phishing Scam Attack
A phishing scam called The HotList is the latest scam currently making its way through Instagram. This scam pretends to be a list of pictures ranked on how "Hot" they are, but just leads to a fake Instagram login page that is used to steal account logins and passwords. [...]
https://www.bleepingcomputer.com/news/security/the-hotlist-is-the-latest-instagram-phishing-scam-attack/
A phishing scam called The HotList is the latest scam currently making its way through Instagram. This scam pretends to be a list of pictures ranked on how "Hot" they are, but just leads to a fake Instagram login page that is used to steal account logins and passwords. [...]
https://www.bleepingcomputer.com/news/security/the-hotlist-is-the-latest-instagram-phishing-scam-attack/
BleepingComputer
The HotList is The Latest Instagram Phishing Scam Attack
A phishing scam called The HotList is the latest scam currently making its way through Instagram. This scam pretends to be a list of pictures ranked on how "Hot" they are, but just leads to a fake Instagram login page that is used to steal account loginsβ¦
Google to Block Logins from Embedded Browser Frameworks
To increase protection against man-in-the-middle (MitM) attacks, Google in June will block sign-ins from embedded browser frameworks, which are used with some forms of phishing. [...]
https://www.bleepingcomputer.com/news/security/google-to-block-logins-from-embedded-browser-frameworks/
To increase protection against man-in-the-middle (MitM) attacks, Google in June will block sign-ins from embedded browser frameworks, which are used with some forms of phishing. [...]
https://www.bleepingcomputer.com/news/security/google-to-block-logins-from-embedded-browser-frameworks/
BleepingComputer
Google to Block Logins from Embedded Browser Frameworks
To increase protection against man-in-the-middle (MitM) attacks, Google in June will block sign-ins from embedded browser frameworks, which are used with some forms of phishing.
The New Microsoft Edge Sometimes Impersonates Other Browsers
The new Chromium-based Microsoft Edge will impersonate other browsers depending on the site being visited. This is may be done for compatibility reasons, like properly rendering pages or how video will be streamed and played back. [...]
https://www.bleepingcomputer.com/news/microsoft/the-new-microsoft-edge-sometimes-impersonates-other-browsers/
The new Chromium-based Microsoft Edge will impersonate other browsers depending on the site being visited. This is may be done for compatibility reasons, like properly rendering pages or how video will be streamed and played back. [...]
https://www.bleepingcomputer.com/news/microsoft/the-new-microsoft-edge-sometimes-impersonates-other-browsers/
BleepingComputer
The New Microsoft Edge Sometimes Impersonates Other Browser's User Agents
The new Chromium-based Microsoft Edge will impersonate other browsers depending on the site being visited. This is may be done for compatibility reasons, like properly rendering pages or how video will be streamed and played back.
The Week in Ransomware - April 19th 2019 - RobbinHood, Samba, and More
This week introduced a new ransomware player that is targeting companies called RobbinHood. This ransomware recently took down the City of Greenville's computer systems and offers two different ransom payments; a price per computer or one for the entire network. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-19th-2019-robbinhood-samba-and-more/
This week introduced a new ransomware player that is targeting companies called RobbinHood. This ransomware recently took down the City of Greenville's computer systems and offers two different ransom payments; a price per computer or one for the entire network. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-19th-2019-robbinhood-samba-and-more/
BleepingComputer
The Week in Ransomware - April 19th 2019 - RobbinHood, Samba, and More
This week introduced a new ransomware player that is targeting companies called RobbinHood. This ransomware recently took down the City of Greenville's computer systems and offers two different ransom payments; a price per computer or one for the entire network.
Mozilla Firefox to Enable Hyperlink Ping Tracking By Default
Mozilla has told BleepingComputer that they will be enabling the tracking feature called hyperlink auditing, or Pings, by default in Firefox. There is no timeline for when this feature will be enabled, but it will be done when their implementation is complete. [...]
https://www.bleepingcomputer.com/news/software/mozilla-firefox-to-enable-hyperlink-ping-tracking-by-default/
Mozilla has told BleepingComputer that they will be enabling the tracking feature called hyperlink auditing, or Pings, by default in Firefox. There is no timeline for when this feature will be enabled, but it will be done when their implementation is complete. [...]
https://www.bleepingcomputer.com/news/software/mozilla-firefox-to-enable-hyperlink-ping-tracking-by-default/
BleepingComputer
Mozilla Firefox to Enable Hyperlink Ping Tracking By Default
Mozilla has told BleepingComputer that they will be enabling the tracking feature called hyperlink auditing, or Pings, by default in Firefox. There is no timeline for when this feature will be enabled, but it will be done when their implementation is complete.