China Routed Traffic from European Carriers for Two Hours
Mobile internet traffic from multiple carriers in Europe took an unintended turn through China Telecom for over two hours on June 6 because of a route leak incident. [...]
https://www.bleepingcomputer.com/news/security/china-routed-traffic-from-european-carriers-for-two-hours/
Mobile internet traffic from multiple carriers in Europe took an unintended turn through China Telecom for over two hours on June 6 because of a route leak incident. [...]
https://www.bleepingcomputer.com/news/security/china-routed-traffic-from-european-carriers-for-two-hours/
BleepingComputer
China Routed Traffic from European Carriers for Two Hours
Mobile internet traffic from multiple carriers in Europe took an unintended turn through China Telecom for over two hours on June 6 because of a route leak incident.
New Extortion Scam Threatens to Ruin a Website's Reputation
A new extortion scam campaign is underway that is targeting websites owners and stating that if they do not make a payment, the attacker will ruin their site's reputation and get them blacklisted for spam. [...]
https://www.bleepingcomputer.com/news/security/new-extortion-scam-threatens-to-ruin-a-websites-reputation/
A new extortion scam campaign is underway that is targeting websites owners and stating that if they do not make a payment, the attacker will ruin their site's reputation and get them blacklisted for spam. [...]
https://www.bleepingcomputer.com/news/security/new-extortion-scam-threatens-to-ruin-a-websites-reputation/
BleepingComputer
New Extortion Scam Threatens to Ruin a Website's Reputation
A new extortion scam campaign is underway that is targeting websites owners and stating that if they do not make a payment, the attacker will ruin their site's reputation and get them blacklisted for spam.
Google Chrome 75 Has a Working Tab Hover Card Feature
If you are like me and lose track of the dozens of tabs you have open at the same time in Google Chrome, you will be happy to know that a working implementation of the browser 's Tab Hover Tab feature is available as an experimental flag. [...]
https://www.bleepingcomputer.com/news/software/google-chrome-75-has-a-working-tab-hover-card-feature/
If you are like me and lose track of the dozens of tabs you have open at the same time in Google Chrome, you will be happy to know that a working implementation of the browser 's Tab Hover Tab feature is available as an experimental flag. [...]
https://www.bleepingcomputer.com/news/software/google-chrome-75-has-a-working-tab-hover-card-feature/
BleepingComputer
Google Chrome 75 Has a Working Tab Hover Card Feature
If you are like me and lose track of the dozens of tabs you have open at the same time in Google Chrome, you will be happy to know that a working implementation of the browser 's Tab Hover Tab feature is available as an experimental flag.
VLC 3.0.7 is Biggest Security Release Due to EU Bounty Program
VLC Media Player 3.0.7 was released on Friday and contained the most security updates ever in one release of the program. The president of the VideoLan non-profit organization states that this was due to their inclusion in the EU-FOSSA bug bounty program. [...]
https://www.bleepingcomputer.com/news/software/vlc-307-is-biggest-security-release-due-to-eu-bounty-program/
VLC Media Player 3.0.7 was released on Friday and contained the most security updates ever in one release of the program. The president of the VideoLan non-profit organization states that this was due to their inclusion in the EU-FOSSA bug bounty program. [...]
https://www.bleepingcomputer.com/news/software/vlc-307-is-biggest-security-release-due-to-eu-bounty-program/
BleepingComputer
VLC 3.0.7 is Biggest Security Release Due to EU Bounty Program
VLC Media Player 3.0.7 was released on Friday and contained the most security updates ever in one release of the program. The president of the VideoLan non-profit organization states that this was due to their inclusion in the EU-FOSSA bug bounty program.
Sysmon Getting DNS Query Logging with Querying Process Name
To the delight of Windows system administrators everywhere, Microsoft has announced that a new version of Sysmon is coming out this week that will include the ability to log DNS queries performed on a monitored computer. Even better, Sysmon will also log the executable that performed the query. [...]
https://www.bleepingcomputer.com/news/microsoft/sysmon-getting-dns-query-logging-with-querying-process-name/
To the delight of Windows system administrators everywhere, Microsoft has announced that a new version of Sysmon is coming out this week that will include the ability to log DNS queries performed on a monitored computer. Even better, Sysmon will also log the executable that performed the query. [...]
https://www.bleepingcomputer.com/news/microsoft/sysmon-getting-dns-query-logging-with-querying-process-name/
BleepingComputer
Sysmon Getting DNS Query Logging with Querying Process Name
To the delight of Windows system administrators everywhere, Microsoft has announced that a new version of Sysmon is coming out this week that will include the ability to log DNS queries performed on a monitored computer. Even better, Sysmon will also logβ¦
Gaming Site Emuparadise Suffered Data Breach of 1.1M Accounts
The Emuparadise retro gaming site has been reported to have suffered a data breach in April 2018. This breach exposed account information for approximately 1.1 million Emuparadise forum members. [...]
https://www.bleepingcomputer.com/news/security/gaming-site-emuparadise-suffered-data-breach-of-11m-accounts/
The Emuparadise retro gaming site has been reported to have suffered a data breach in April 2018. This breach exposed account information for approximately 1.1 million Emuparadise forum members. [...]
https://www.bleepingcomputer.com/news/security/gaming-site-emuparadise-suffered-data-breach-of-11m-accounts/
BleepingComputer
Gaming Site Emuparadise Suffered Data Breach of 1.1M Accounts
The Emuparadise retro gaming site has been reported to have suffered a data breach in April 2018. This breach exposed account information for approximately 1.1 million Emuparadise forum members.
MuddyWater Updates POWERSTATS Backdoor For Multi-Stage Attacks
The Iranian-backed MuddyWater cyber-espionage group is continuously upgrading and improving its tools lately, with the group's POWERSTATS backdoor being the last to receive an update. [...]
https://www.bleepingcomputer.com/news/security/muddywater-updates-powerstats-backdoor-for-multi-stage-attacks/
The Iranian-backed MuddyWater cyber-espionage group is continuously upgrading and improving its tools lately, with the group's POWERSTATS backdoor being the last to receive an update. [...]
https://www.bleepingcomputer.com/news/security/muddywater-updates-powerstats-backdoor-for-multi-stage-attacks/
BleepingComputer
MuddyWater Updates POWERSTATS Backdoor For Multi-Stage Attacks
The Iranian-backed MuddyWater cyber-espionage group is continuously upgrading and improving its tools lately, with the group's POWERSTATS backdoor being the last to receive an update.
'jesushelpme' Password Sums Up CyberSec Agency Security State
Agents of the Information Network Security Agency (INSA) - the top-level cyber security agency in Ethiopia, used laughingly weak credentials to protect their email accounts. [...]
https://www.bleepingcomputer.com/news/security/jesushelpme-password-sums-up-cybersec-agency-security-state/
Agents of the Information Network Security Agency (INSA) - the top-level cyber security agency in Ethiopia, used laughingly weak credentials to protect their email accounts. [...]
https://www.bleepingcomputer.com/news/security/jesushelpme-password-sums-up-cybersec-agency-security-state/
BleepingComputer
'jesushelpme' Password Sums Up CyberSec Agency Security State
Agents of the Information Network Security Agency (INSA) - the top-level cyber security agency in Ethiopia, used laughingly weak credentials to protect their email accounts.
FBI Issues Warning on βSecureβ Websites Used For Phishing
FBI issued a public service announcement regarding TLS-secured websites being actively used by malicious actors in phishing campaigns to trick users into trusting attacker-controlled sites and handing over sensitive personal information. [...]
https://www.bleepingcomputer.com/news/security/fbi-issues-warning-on-secure-websites-used-for-phishing/
FBI issued a public service announcement regarding TLS-secured websites being actively used by malicious actors in phishing campaigns to trick users into trusting attacker-controlled sites and handing over sensitive personal information. [...]
https://www.bleepingcomputer.com/news/security/fbi-issues-warning-on-secure-websites-used-for-phishing/
BleepingComputer
FBI Issues Warning on βSecureβ Websites Used For Phishing
FBI issued a public service announcement regarding TLS-secured websites being actively used by malicious actors in phishing campaigns to trick users into trusting attacker-controlled sites and handing over sensitive personal information.
Microsoft is Bringing Predictive Typing to All Windows 10 Apps
A new predictive typing feature has been found hidden in the latest Windows 10 20H1 builds. This feature displays suggestions of words that Windows predicts you are going to write so that you can quickly select them. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-bringing-predictive-typing-to-all-windows-10-apps/
A new predictive typing feature has been found hidden in the latest Windows 10 20H1 builds. This feature displays suggestions of words that Windows predicts you are going to write so that you can quickly select them. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-bringing-predictive-typing-to-all-windows-10-apps/
BleepingComputer
Microsoft is Bringing Predictive Typing to All Windows 10 Apps
A new predictive typing feature has been found hidden in the latest Windows 10 20H1 builds. This feature displays suggestions of words that Windows predicts you are going to write so that you can quickly select them.
New Spam Campaign Controlled by Attackers via DNS TXT Records
A new finance spam campaign with HTML attachments has been discovered that utilizes Google's public DNS resolver to retrieve JavaScript commands embedded in a domain's TXT record. These commands will then redirect a user's browser to a aggressive trading advertisement site, which has been reported as a scam. [...]
https://www.bleepingcomputer.com/news/security/new-spam-campaign-controlled-by-attackers-via-dns-txt-records/
A new finance spam campaign with HTML attachments has been discovered that utilizes Google's public DNS resolver to retrieve JavaScript commands embedded in a domain's TXT record. These commands will then redirect a user's browser to a aggressive trading advertisement site, which has been reported as a scam. [...]
https://www.bleepingcomputer.com/news/security/new-spam-campaign-controlled-by-attackers-via-dns-txt-records/
BleepingComputer
New Spam Campaign Controlled by Attackers via DNS TXT Records
A new finance spam campaign with HTML attachments has been discovered that utilizes Google's public DNS resolver to retrieve JavaScript commands embedded in a domain's TXT record. These commands will then redirect a user's browser to a aggressive tradingβ¦
WordPress Chat Plugin Bug Lets Hackers Inject Text, Steal Logs
Admins of websites with WP Live Chat Support for Wordpress installations should immediately update the plugin to version 8.0.33 or later to patch a critical authentication bypass which can be exploited by attackers without valid credentials. [...]
https://www.bleepingcomputer.com/news/security/wordpress-chat-plugin-bug-lets-hackers-inject-text-steal-logs/
Admins of websites with WP Live Chat Support for Wordpress installations should immediately update the plugin to version 8.0.33 or later to patch a critical authentication bypass which can be exploited by attackers without valid credentials. [...]
https://www.bleepingcomputer.com/news/security/wordpress-chat-plugin-bug-lets-hackers-inject-text-steal-logs/
BleepingComputer
WordPress Chat Plugin Bug Lets Hackers Inject Text, Steal Logs
Admins of websites with WP Live Chat Support for Wordpress installations should immediately update the plugin to version 8.0.33 or later to patch a critical authentication bypass which can be exploited by attackers without valid credentials.
Food Bank Hit By Ransomware, Needs Your Charity to Rebuild
Ransomware attacks hit indiscriminately and sometimes they may affect charitable organizations that can't afford to surrender to the demand. Auburn Food Bank in King County, Washington, fell victim to a ransomware strain known as GlobeImposter 2.0, which encrypted all computers on their network. [...]
https://www.bleepingcomputer.com/news/security/food-bank-hit-by-ransomware-needs-your-charity-to-rebuild/
Ransomware attacks hit indiscriminately and sometimes they may affect charitable organizations that can't afford to surrender to the demand. Auburn Food Bank in King County, Washington, fell victim to a ransomware strain known as GlobeImposter 2.0, which encrypted all computers on their network. [...]
https://www.bleepingcomputer.com/news/security/food-bank-hit-by-ransomware-needs-your-charity-to-rebuild/
BleepingComputer
Food Bank Hit By Ransomware, Needs Your Charity to Rebuild
Ransomware attacks hit indiscriminately and sometimes they may affect charitable organizations that can't afford to surrender to the demand. Auburn Food Bank in King County, Washington, fell victim to a ransomware strain known as GlobeImposter 2.0, whichβ¦
Finding Windows Systems Affected by BlueKeep Remote Desktop Bug
Researchers have created tools and scripts that can be used to find Windows machines vulnerable to the BlueKeep vulnerability so that they can be patched. In this article we discuss two of these tools. [...]
https://www.bleepingcomputer.com/news/security/finding-windows-systems-affected-by-bluekeep-remote-desktop-bug/
Researchers have created tools and scripts that can be used to find Windows machines vulnerable to the BlueKeep vulnerability so that they can be patched. In this article we discuss two of these tools. [...]
https://www.bleepingcomputer.com/news/security/finding-windows-systems-affected-by-bluekeep-remote-desktop-bug/
BleepingComputer
Finding Windows Systems Affected by BlueKeep Remote Desktop Bug
Researchers have created tools and scripts that can be used to find Windows machines vulnerable to the BlueKeep vulnerability so that they can be patched. In this article we discuss two of these tools.
Mozilla Makes Firefox its Own Brand Name, Releases New Logos
Mozilla has announced that "Firefox" is becoming its own brand name that encompasses the Firefox Browser, Firefox Send, Firefox Lockwise, and Firefox Monitor products. Along with this new umbrella name, Mozilla has released redesigned icons that represent the future of this brand. [...]
https://www.bleepingcomputer.com/news/software/mozilla-makes-firefox-its-own-brand-name-releases-new-logos/
Mozilla has announced that "Firefox" is becoming its own brand name that encompasses the Firefox Browser, Firefox Send, Firefox Lockwise, and Firefox Monitor products. Along with this new umbrella name, Mozilla has released redesigned icons that represent the future of this brand. [...]
https://www.bleepingcomputer.com/news/software/mozilla-makes-firefox-its-own-brand-name-releases-new-logos/
BleepingComputer
Mozilla Makes Firefox its Own Brand Name, Releases New Logos
Mozilla has announced that "Firefox" is becoming its own brand name that encompasses the Firefox Browser, Firefox Send, Firefox Lockwise, and Firefox Monitor products. Along with this new umbrella name, Mozilla has released redesigned icons that representβ¦
Radiohead Releases OK Computer Sessions After Hack, Won't Pay Ransom
Alternative rock band Radiohead released 18 tracks of OK Computer sessions after hackers stole several archived mini discs from Thom Yorke, the band's lead singer and main songwriter. [...]
https://www.bleepingcomputer.com/news/security/radiohead-releases-ok-computer-sessions-after-hack-wont-pay-ransom/
Alternative rock band Radiohead released 18 tracks of OK Computer sessions after hackers stole several archived mini discs from Thom Yorke, the band's lead singer and main songwriter. [...]
https://www.bleepingcomputer.com/news/security/radiohead-releases-ok-computer-sessions-after-hack-wont-pay-ransom/
BleepingComputer
Radiohead Releases OK Computer Sessions After Hack, Won't Pay Ransom
Alternative rock band Radiohead released 18 tracks of OK Computer sessions after hackers stole several archived mini discs from Thom Yorke, the band's lead singer and main songwriter.
Adobe Releases Security Updates for Flash Player, ColdFusion, and Campaign
Adobe has published their monthly Patch Tuesday updates for the month of June 2019. These updates includes fixes for vulnerabilities in Adobe ColdFusion, Adobe Campaign, and Adobe Flash Player. [...]
https://www.bleepingcomputer.com/news/security/adobe-releases-security-updates-for-flash-player-coldfusion-and-campaign/
Adobe has published their monthly Patch Tuesday updates for the month of June 2019. These updates includes fixes for vulnerabilities in Adobe ColdFusion, Adobe Campaign, and Adobe Flash Player. [...]
https://www.bleepingcomputer.com/news/security/adobe-releases-security-updates-for-flash-player-coldfusion-and-campaign/
BleepingComputer
Adobe Releases Security Updates for Flash Player, ColdFusion, and Campaign
Adobe has published their monthly Patch Tuesday updates for the month of June 2019. These updates includes fixes for vulnerabilities in Adobe ColdFusion, Adobe Campaign, and Adobe Flash Player.
RAMBleed Attack Can Steal Sensitive Data From Computer Memory
Researchers found a new method to impact the confidentiality of the data stored in the computer memory, successfully extracting a signing key from an OpenSSH server with nothing by normal user permissions. [...]
https://www.bleepingcomputer.com/news/security/rambleed-attack-can-steal-sensitive-data-from-computer-memory/
Researchers found a new method to impact the confidentiality of the data stored in the computer memory, successfully extracting a signing key from an OpenSSH server with nothing by normal user permissions. [...]
https://www.bleepingcomputer.com/news/security/rambleed-attack-can-steal-sensitive-data-from-computer-memory/
BleepingComputer
RAMBleed Attack Can Steal Sensitive Data From Computer Memory
Researchers found a new method to impact the confidentiality of the data stored in the computer memory, successfully extracting a signing key from an OpenSSH server with nothing by normal user permissions.
Microsoft NTLM Flaws Expose All Windows Machines to RCE Attacks
Two critical vulnerabilities in Microsoft's NTLM authentication protocol consisting of three logical flaws make it possible for attackers to run remote code and authenticate on machines running any Windows version. [...]
https://www.bleepingcomputer.com/news/security/microsoft-ntlm-flaws-expose-all-windows-machines-to-rce-attacks/
Two critical vulnerabilities in Microsoft's NTLM authentication protocol consisting of three logical flaws make it possible for attackers to run remote code and authenticate on machines running any Windows version. [...]
https://www.bleepingcomputer.com/news/security/microsoft-ntlm-flaws-expose-all-windows-machines-to-rce-attacks/
BleepingComputer
Microsoft NTLM Flaws Expose All Windows Machines to RCE Attacks
Two critical vulnerabilities in Microsoft's NTLM authentication protocol consisting of three logical flaws make it possible for attackers to run remote code and authenticate on machines running any Windows version.
Microsoft Blocks Some Bluetooth Devices Due to Security Risks
Microsoft says that certain Bluetooth devices might start experiencing pairing and connectivity issues after Windows users apply cumulative, security, or monthly rollup updates released today. [...]
https://www.bleepingcomputer.com/news/security/microsoft-blocks-some-bluetooth-devices-due-to-security-risks/
Microsoft says that certain Bluetooth devices might start experiencing pairing and connectivity issues after Windows users apply cumulative, security, or monthly rollup updates released today. [...]
https://www.bleepingcomputer.com/news/security/microsoft-blocks-some-bluetooth-devices-due-to-security-risks/
BleepingComputer
Microsoft Blocks Some Bluetooth Devices Due to Security Risks
Microsoft says that certain Bluetooth devices might start experiencing pairing and connectivity issues after Windows users apply cumulative, security, or monthly rollup updates released today.
Microsoft's June 2019 Patch Tuesday Fixes 88 Vulnerabilities
Today is Microsoft's June 2019 Patch Tuesday, which means that Windows admins are pulling their hair out as they get ready to test or install the latest patches and security updates released by Microsoft. Included in this month's updates are fixes for four publicly disclosed vulnerabilities. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-june-2019-patch-tuesday-fixes-88-vulnerabilities/
Today is Microsoft's June 2019 Patch Tuesday, which means that Windows admins are pulling their hair out as they get ready to test or install the latest patches and security updates released by Microsoft. Included in this month's updates are fixes for four publicly disclosed vulnerabilities. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-june-2019-patch-tuesday-fixes-88-vulnerabilities/
BleepingComputer
Microsoft's June 2019 Patch Tuesday Fixes 88 Vulnerabilities
Today is Microsoft's June 2019 Patch Tuesday, which means that Windows admins are pulling their hair out as they get ready to test or install the latest patches and security updates released by Microsoft. Included in this month's updates are fixes for fourβ¦