Attackers Stitch Together Frankenstein Campaign Using Free Tools
Threat actors behind a highly-targeted series of cyber attacks spanning from January to April 2019 have been seen employing malicious tools built using freely available components to infect victims with malware designed to harvest credentials. [...]
https://www.bleepingcomputer.com/news/security/attackers-stitch-together-frankenstein-campaign-using-free-tools/
Threat actors behind a highly-targeted series of cyber attacks spanning from January to April 2019 have been seen employing malicious tools built using freely available components to infect victims with malware designed to harvest credentials. [...]
https://www.bleepingcomputer.com/news/security/attackers-stitch-together-frankenstein-campaign-using-free-tools/
BleepingComputer
Attackers Stitch Together Frankenstein Campaign Using Free Tools
Threat actors behind a highly-targeted series of cyber attacks spanning from January to April 2019 have been seen employing malicious tools built using freely available components to infect victims with malware designed to harvest credentials.
New Privacy Features for Mozilla Firefox, Lockwise Is Live
Mozilla announced new features and changes today that aim to increase the privacy of Firefox users by blocking trackers and offering updates to various Firefox security and privacy services. [...]
https://www.bleepingcomputer.com/news/security/new-privacy-features-for-mozilla-firefox-lockwise-is-live/
Mozilla announced new features and changes today that aim to increase the privacy of Firefox users by blocking trackers and offering updates to various Firefox security and privacy services. [...]
https://www.bleepingcomputer.com/news/security/new-privacy-features-for-mozilla-firefox-lockwise-is-live/
BleepingComputer
New Privacy Features for Mozilla Firefox, Lockwise Is Live
Mozilla announced new features and changes today that aim to increase the privacy of Firefox users by blocking trackers and offering updates to various Firefox security and privacy services.
Chrome 75 Released with 42 Security Fixes and New Features
Google has released Chrome 75 to the Stable desktop channel, with new features and 42 security fixes, with two of them being marked as High severity. [...]
https://www.bleepingcomputer.com/news/google/chrome-75-released-with-42-security-fixes-and-new-features/
Google has released Chrome 75 to the Stable desktop channel, with new features and 42 security fixes, with two of them being marked as High severity. [...]
https://www.bleepingcomputer.com/news/google/chrome-75-released-with-42-security-fixes-and-new-features/
BleepingComputer
Chrome 75 Released with 42 Security Fixes and New Features
Google has released Chrome 75 to the Stable desktop channel, with new features and 42 security fixes, with two of them being marked as High severity.
Microsoft Asking for Feedback on the Windows 10 Start Menu
In the Windows 10 Insider builds, Microsoft has started asking Insiders for feedback regarding how they feel about the Windows 10 Start Menu better and if they have suggestions on how to make it better. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-asking-for-feedback-on-the-windows-10-start-menu/
In the Windows 10 Insider builds, Microsoft has started asking Insiders for feedback regarding how they feel about the Windows 10 Start Menu better and if they have suggestions on how to make it better. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-asking-for-feedback-on-the-windows-10-start-menu/
BleepingComputer
Microsoft Asking for Feedback on the Windows 10 Start Menu
In the Windows 10 Insider builds, Microsoft has started asking Insiders for feedback regarding how they feel about the Windows 10 Start Menu better and if they have suggestions on how to make it better.
MetaSploit Module Created for BlueKeep Flaw, Private for Now
A researcher has created a module for the Metasploit Framework for penetration testing that exploits the critical BlueKeep vulnerability on vulnerable Windows XP, 7, and Server 2008 machines to achieve remote code execution. [...]
https://www.bleepingcomputer.com/news/security/metasploit-module-created-for-bluekeep-flaw-private-for-now/
A researcher has created a module for the Metasploit Framework for penetration testing that exploits the critical BlueKeep vulnerability on vulnerable Windows XP, 7, and Server 2008 machines to achieve remote code execution. [...]
https://www.bleepingcomputer.com/news/security/metasploit-module-created-for-bluekeep-flaw-private-for-now/
BleepingComputer
MetaSploit Module Created for BlueKeep Flaw, Private for Now
A researcher has created a module for the Metasploit Framework for penetration testing that exploits the critical BlueKeep vulnerability on vulnerable Windows XP, 7, and Server 2008 machines to achieve remote code execution.
Scattered Canary Evolves From One-Man Operation to BEC Giant
A Nigerian cybercriminal group dubbed Scattered Canary has evolved from one-man Craigslist and romance scams to a large scale criminal business running multiple types of frauds concomitantly and coordinating at least 35 threat actors. [...]
https://www.bleepingcomputer.com/news/security/scattered-canary-evolves-from-one-man-operation-to-bec-giant/
A Nigerian cybercriminal group dubbed Scattered Canary has evolved from one-man Craigslist and romance scams to a large scale criminal business running multiple types of frauds concomitantly and coordinating at least 35 threat actors. [...]
https://www.bleepingcomputer.com/news/security/scattered-canary-evolves-from-one-man-operation-to-bec-giant/
BleepingComputer
Scattered Canary Evolves From One-Man Operation to BEC Giant
A Nigerian cybercriminal group dubbed Scattered Canary has evolved from one-man Craigslist and romance scams to a large scale criminal business running multiple types of frauds concomitantly and coordinating at least 35 threat actors.
Phishing Kits Add More Vulnerabilities to Hacked Servers
Many phishing kits come with web app vulnerabilities that could expose the servers used for their deployment to new attacks which could lead to full server take over. [...]
https://www.bleepingcomputer.com/news/security/phishing-kits-add-more-vulnerabilities-to-hacked-servers/
Many phishing kits come with web app vulnerabilities that could expose the servers used for their deployment to new attacks which could lead to full server take over. [...]
https://www.bleepingcomputer.com/news/security/phishing-kits-add-more-vulnerabilities-to-hacked-servers/
BleepingComputer
Phishing Kits Add More Vulnerabilities to Hacked Servers
Many phishing kits come with web app vulnerabilities that could expose the servers used for their deployment to new attacks which could lead to full server take over.
Fake Cryptocurrency Trading Site Pushes Crypto Stealing Malware
Malware distributors have setup a site that impersonates the legitimate Cryptohopper cryptocurrency trading platform in order to distribute malware payloads such as information-stealing Trojans, miners, and clipboard hijackers. [...]
https://www.bleepingcomputer.com/news/security/fake-cryptocurrency-trading-site-pushes-crypto-stealing-malware/
Malware distributors have setup a site that impersonates the legitimate Cryptohopper cryptocurrency trading platform in order to distribute malware payloads such as information-stealing Trojans, miners, and clipboard hijackers. [...]
https://www.bleepingcomputer.com/news/security/fake-cryptocurrency-trading-site-pushes-crypto-stealing-malware/
BleepingComputer
Fake Cryptocurrency Trading Site Pushes Crypto Stealing Malware
Malware distributors have setup a site that impersonates the legitimate Cryptohopper cryptocurrency trading platform in order to distribute malware payloads such as information-stealing Trojans, miners, and clipboard hijackers.
Windows 10 Insider Build 18912 Fixes win32k.sys GSOD Crashes
Microsoft has released Windows 10 Insider Preview Build 18912 to Insiders in the Fast ring. This build includes numerous bug fixes, including fixes for Win32k.sys GSOD and DWM crashes and Narrator improvements. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18912-fixes-win32ksys-gsod-crashes/
Microsoft has released Windows 10 Insider Preview Build 18912 to Insiders in the Fast ring. This build includes numerous bug fixes, including fixes for Win32k.sys GSOD and DWM crashes and Narrator improvements. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18912-fixes-win32ksys-gsod-crashes/
BleepingComputer
Windows 10 Insider Build 18912 Fixes win32k.sys GSOD Crashes
Microsoft has released Windows 10 Insider Preview Build 18912 to Insiders in the Fast ring. This build includes numerous bug fixes, including fixes for Win32k.sys GSOD and DWM crashes and Narrator improvements.
LibreOffice Will No Longer Provide 32-bit Linux Binaries
With the announcement of LibreOffice 6.3 Beta 1, the open source office suite has also stopped providing 32-bit binaries for the Linux platform, although 32-bit compatibility has not yet been removed. [...]
https://www.bleepingcomputer.com/news/software/libreoffice-will-no-longer-provide-32-bit-linux-binaries/
With the announcement of LibreOffice 6.3 Beta 1, the open source office suite has also stopped providing 32-bit binaries for the Linux platform, although 32-bit compatibility has not yet been removed. [...]
https://www.bleepingcomputer.com/news/software/libreoffice-will-no-longer-provide-32-bit-linux-binaries/
BleepingComputer
LibreOffice Will No Longer Provide 32-bit Linux Binaries
With the announcement of LibreOffice 6.3 Beta 1, the open source office suite has also stopped providing 32-bit binaries for the Linux platform, although 32-bit compatibility has not yet been removed.
Cisco Fixes High Severity Flaws in Industrial, Enterprise Tools
Cisco patched two high severity improper input validation vulnerabilities found in the update feature of the Cisco Industrial Network Director (IND) software and the authentication service of Cisco Unified Presence (Cisco Unified CM IM&P Service, Cisco VCS, and Cisco Expressway Series). [...]
https://www.bleepingcomputer.com/news/security/cisco-fixes-high-severity-flaws-in-industrial-enterprise-tools/
Cisco patched two high severity improper input validation vulnerabilities found in the update feature of the Cisco Industrial Network Director (IND) software and the authentication service of Cisco Unified Presence (Cisco Unified CM IM&P Service, Cisco VCS, and Cisco Expressway Series). [...]
https://www.bleepingcomputer.com/news/security/cisco-fixes-high-severity-flaws-in-industrial-enterprise-tools/
BleepingComputer
Cisco Fixes High Severity Flaws in Industrial, Enterprise Tools
Cisco patched two high severity improper input validation vulnerabilities found in the update feature of the Cisco Industrial Network Director (IND) software and the authentication service of Cisco Unified Presence (Cisco Unified CM IM&P Service, Cisco VCS…
Tor Browser 8.5.1 Released With WebGL Fingerprinting Fix
The Tor Project has released Tor Browser 8.5.1 and it is now available for Windows, Mac, Linux, and Android. This release is the first bug fix since 8.5 was released and also includes a temporary fix for a known WebGL fingerprinting technique. [...]
https://www.bleepingcomputer.com/news/software/tor-browser-851-released-with-webgl-fingerprinting-fix/
The Tor Project has released Tor Browser 8.5.1 and it is now available for Windows, Mac, Linux, and Android. This release is the first bug fix since 8.5 was released and also includes a temporary fix for a known WebGL fingerprinting technique. [...]
https://www.bleepingcomputer.com/news/software/tor-browser-851-released-with-webgl-fingerprinting-fix/
BleepingComputer
Tor Browser 8.5.1 Released With WebGL Fingerprinting Fix
The Tor Project has released Tor Browser 8.5.1 and it is now available for Windows, Mac, Linux, and Android. This release is the first bug fix since 8.5 was released and also includes a temporary fix for a known WebGL fingerprinting technique.
The RIG Exploit Kit is Now Pushing the Buran Ransomware
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through Russian malvertising campaigns. [...]
https://www.bleepingcomputer.com/news/security/the-rig-exploit-kit-is-now-pushing-the-buran-ransomware/
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through Russian malvertising campaigns. [...]
https://www.bleepingcomputer.com/news/security/the-rig-exploit-kit-is-now-pushing-the-buran-ransomware/
BleepingComputer
The RIG Exploit Kit is Now Pushing the Buran Ransomware
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through Russian malvertising campaigns.
The MuddyWater APT Group Adds New Tools to Their Arsenal
The Iranian MuddyWater cyber-espionage group added new attack vectors to use as part of hacking campaigns targeting telecommunication and governmental organizations according to an analysis from the Clearsky Security threat intelligence outfit. [...]
https://www.bleepingcomputer.com/news/security/the-muddywater-apt-group-adds-new-tools-to-their-arsenal/
The Iranian MuddyWater cyber-espionage group added new attack vectors to use as part of hacking campaigns targeting telecommunication and governmental organizations according to an analysis from the Clearsky Security threat intelligence outfit. [...]
https://www.bleepingcomputer.com/news/security/the-muddywater-apt-group-adds-new-tools-to-their-arsenal/
BleepingComputer
The MuddyWater APT Group Adds New Tools to Their Arsenal
The Iranian MuddyWater cyber-espionage group added new attack vectors to use as part of hacking campaigns targeting telecommunication and governmental organizations according to an analysis from the Clearsky Security threat intelligence outfit.
Microsoft Warns Against Bypassing Office 365 Spam Filters
Microsoft urges both administrators and users to not bypass the Microsoft Office 365 spam filters in a support document published today and it provides guidelines for cases when this can't be avoided. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-against-bypassing-office-365-spam-filters/
Microsoft urges both administrators and users to not bypass the Microsoft Office 365 spam filters in a support document published today and it provides guidelines for cases when this can't be avoided. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-against-bypassing-office-365-spam-filters/
BleepingComputer
Microsoft Warns Against Bypassing Office 365 Spam Filters
Microsoft urges both administrators and users to not bypass the Microsoft Office 365 spam filters in a support document published today and it provides guidelines for cases when this can't be avoided.
Another Hacker Selling Access to Charity, Antivirus Firm Networks
A threat actor observed on underground hacker forums peddling internal network access to various entities claims to have breached the infrastructure of notable organizations such as UNICEF or cybersecurity companies Symantec and Comodo. [...]
https://www.bleepingcomputer.com/news/security/another-hacker-selling-access-to-charity-antivirus-firm-networks/
A threat actor observed on underground hacker forums peddling internal network access to various entities claims to have breached the infrastructure of notable organizations such as UNICEF or cybersecurity companies Symantec and Comodo. [...]
https://www.bleepingcomputer.com/news/security/another-hacker-selling-access-to-charity-antivirus-firm-networks/
BleepingComputer
Another Hacker Selling Access to Charity, Antivirus Firm Networks
A threat actor observed on underground hacker forums peddling internal network access to various entities claims to have breached the infrastructure of notable organizations such as UNICEF or cybersecurity companies Symantec and Comodo.
Over 400,000 Opko Health Clients Impacted by AMCA Data Breach
Medical tests and medication firm OPKO Health Inc present in over 30 countries says that one of its subsidiaries, BioReference Laboratories Inc, was notified by American Medical Collection Agency (AMCA) of unauthorized activity on its web payment page. [...]
https://www.bleepingcomputer.com/news/security/over-400-000-opko-health-clients-impacted-by-amca-data-breach/
Medical tests and medication firm OPKO Health Inc present in over 30 countries says that one of its subsidiaries, BioReference Laboratories Inc, was notified by American Medical Collection Agency (AMCA) of unauthorized activity on its web payment page. [...]
https://www.bleepingcomputer.com/news/security/over-400-000-opko-health-clients-impacted-by-amca-data-breach/
BleepingComputer
Over 400,000 Opko Health Clients Impacted by AMCA Data Breach
Medical tests and medication firm OPKO Health Inc present in over 30 countries says that one of its subsidiaries, BioReference Laboratories Inc, was notified by American Medical Collection Agency (AMCA) of unauthorized activity on its web payment page.
Bug Breaks Internet Explorer 11 on Some Windows 10 Versions
The latest updates for Windows 10 version 1809 and Windows Server 2019 could prevent Internet Explorer 11 from launching if there is no default search provider or a malformed one is configured for the browser. [...]
https://www.bleepingcomputer.com/news/microsoft/bug-breaks-internet-explorer-11-on-some-windows-10-versions/
The latest updates for Windows 10 version 1809 and Windows Server 2019 could prevent Internet Explorer 11 from launching if there is no default search provider or a malformed one is configured for the browser. [...]
https://www.bleepingcomputer.com/news/microsoft/bug-breaks-internet-explorer-11-on-some-windows-10-versions/
BleepingComputer
Bug Breaks Internet Explorer 11 on Some Windows 10 Versions
The latest updates for Windows 10 version 1809 and Windows Server 2019 could prevent Internet Explorer 11 from launching if there is no default search provider or a malformed one is configured for the browser.
Millions of Exim Mail Servers Exposed to Local, Remote Attacks
A critical severity vulnerability present in multiple versions of the Exim mail transfer agent (MTA) software makes it possible for unauthenticated remote attackers to execute arbitrary commands on mail servers for some non-default server configurations. [...]
https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-exposed-to-local-remote-attacks/
A critical severity vulnerability present in multiple versions of the Exim mail transfer agent (MTA) software makes it possible for unauthenticated remote attackers to execute arbitrary commands on mail servers for some non-default server configurations. [...]
https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-exposed-to-local-remote-attacks/
BleepingComputer
Millions of Exim Mail Servers Exposed to Local, Remote Attacks
A critical severity vulnerability present in multiple versions of the Exim mail transfer agent (MTA) software makes it possible for unauthenticated remote attackers to execute arbitrary commands on mail servers for some non-default server configurations.
Phishing Email Warns: Add Recovery Number or Account Deleted
BleepingComputer has been focusing on alerting our readers to interesting phishing email campaigns that stand out from the normal invoices, summons, parking tickets, and shipping notifications that we see so often. [...]
https://www.bleepingcomputer.com/news/security/phishing-email-warns-add-recovery-number-or-account-deleted/
BleepingComputer has been focusing on alerting our readers to interesting phishing email campaigns that stand out from the normal invoices, summons, parking tickets, and shipping notifications that we see so often. [...]
https://www.bleepingcomputer.com/news/security/phishing-email-warns-add-recovery-number-or-account-deleted/
BleepingComputer
Phishing Email Warns: Add Recovery Number or Account Deleted
BleepingComputer has been focusing on alerting our readers to interesting phishing email campaigns that stand out from the normal invoices, summons, parking tickets, and shipping notifications that we see so often.
Three Hidden Features Found in Next Windows 10 Version
Yesterday, Microsoft released Windows 10 Insider Preview 20H1 Build 18912 for users in the Fast Rings and with it come three new features hidden in the OS that will most likely make it into the next build. [...]
https://www.bleepingcomputer.com/news/microsoft/three-hidden-features-found-in-next-windows-10-version/
Yesterday, Microsoft released Windows 10 Insider Preview 20H1 Build 18912 for users in the Fast Rings and with it come three new features hidden in the OS that will most likely make it into the next build. [...]
https://www.bleepingcomputer.com/news/microsoft/three-hidden-features-found-in-next-windows-10-version/
BleepingComputer
Three Hidden Features Found in Next Windows 10 Version
Yesterday, Microsoft released Windows 10 Insider Preview 20H1 Build 18912 for users in the Fast Rings and with it come three new features hidden in the OS that will most likely make it into the next build.