Millions of Exim Mail Servers Are Currently Being Attacked
Millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions are currently under siege, with attackers gaining permanent root access via SSH to the exploited machines according to security researchers. [...]
https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-are-currently-being-attacked/
Millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions are currently under siege, with attackers gaining permanent root access via SSH to the exploited machines according to security researchers. [...]
https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-are-currently-being-attacked/
BleepingComputer
Millions of Exim Mail Servers Are Currently Being Attacked
Millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions are currently under siege, with attackers gaining permanent root access via SSH to the exploited machines according to security researchers.
Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps
Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it. [...]
https://www.bleepingcomputer.com/news/security/critical-bug-in-infusion-system-allows-changing-drug-dose-in-medical-pumps/
Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it. [...]
https://www.bleepingcomputer.com/news/security/critical-bug-in-infusion-system-allows-changing-drug-dose-in-medical-pumps/
BleepingComputer
Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps
Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it.
pyLocky Decryptor Released by French Authorities
A decryptor for pyLocky Ransomware versions 1 and 2 has been released by French authorities that allows victim to decrypt their files for free. [...]
https://www.bleepingcomputer.com/news/security/pylocky-decryptor-released-by-french-authorities/
A decryptor for pyLocky Ransomware versions 1 and 2 has been released by French authorities that allows victim to decrypt their files for free. [...]
https://www.bleepingcomputer.com/news/security/pylocky-decryptor-released-by-french-authorities/
BleepingComputer
pyLocky Decryptor Released by French Authorities
A decryptor for pyLocky Ransomware versions 1 and 2 has been released by French authorities that allows victim to decrypt their files for free.
Twitter URLs Can Be Manipulated to Spread Fake News and Scams
The way Twitter creates URLs to a tweet could be abused for unscrupulous purposes that range from running disinformation campaigns to spreading malware or tricking users into landing on a malicious web page. [...]
https://www.bleepingcomputer.com/news/security/twitter-urls-can-be-manipulated-to-spread-fake-news-and-scams/
The way Twitter creates URLs to a tweet could be abused for unscrupulous purposes that range from running disinformation campaigns to spreading malware or tricking users into landing on a malicious web page. [...]
https://www.bleepingcomputer.com/news/security/twitter-urls-can-be-manipulated-to-spread-fake-news-and-scams/
BleepingComputer
Twitter URLs Can Be Manipulated to Spread Fake News and Scams
The way Twitter creates URLs to a tweet could be abused for unscrupulous purposes that range from running disinformation campaigns to spreading malware or tricking users into landing on a malicious web page.
Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools
Security researchers have discovered an ongoing cryptojacking campaign which infects unpatched computers of businesses from all over the world with XMRig Monero miners using Equation group's leaked exploit toolkit. [...]
https://www.bleepingcomputer.com/news/security/hackers-infect-businesses-with-cryptominers-using-nsa-leaked-tools/
Security researchers have discovered an ongoing cryptojacking campaign which infects unpatched computers of businesses from all over the world with XMRig Monero miners using Equation group's leaked exploit toolkit. [...]
https://www.bleepingcomputer.com/news/security/hackers-infect-businesses-with-cryptominers-using-nsa-leaked-tools/
BleepingComputer
Hackers Infect Businesses with CryptoMiners Using NSA Leaked Tools
Security researchers have discovered an ongoing cryptojacking campaign which infects unpatched computers of businesses from all over the world with XMRig Monero miners using Equation group's leaked exploit toolkit.
Chrome 76 Beta Allows Sites to Use Your OS Dark Mode Settings
Google is now rolling out Chrome 76 to the beta channel with dark mode and Payments API improvements, as well as easier to install Progressive Web Apps on the desktop. [...]
https://www.bleepingcomputer.com/news/google/chrome-76-beta-allows-sites-to-use-your-os-dark-mode-settings/
Google is now rolling out Chrome 76 to the beta channel with dark mode and Payments API improvements, as well as easier to install Progressive Web Apps on the desktop. [...]
https://www.bleepingcomputer.com/news/google/chrome-76-beta-allows-sites-to-use-your-os-dark-mode-settings/
BleepingComputer
Chrome 76 Beta Allows Sites to Use Your OS Dark Mode Settings
Google is now rolling out Chrome 76 to the beta channel with dark mode and Payments API improvements, as well as easier to install Progressive Web Apps on the desktop.
AVG Password Protection Blocked Firefox's Access to Saved Passwords
With the release of Firefox 67.0.2, some users began noticing that the browser had stopped automatically filling in their saved logins. Even worse, when they tried to access their saved logins using the Firefox password manager, they noticed that the list was empty. [...]
https://www.bleepingcomputer.com/news/security/avg-password-protection-blocked-firefoxs-access-to-saved-passwords/
With the release of Firefox 67.0.2, some users began noticing that the browser had stopped automatically filling in their saved logins. Even worse, when they tried to access their saved logins using the Firefox password manager, they noticed that the list was empty. [...]
https://www.bleepingcomputer.com/news/security/avg-password-protection-blocked-firefoxs-access-to-saved-passwords/
BleepingComputer
AVG Password Protection Blocked Firefox's Access to Saved Passwords
With the release of Firefox 67.0.2, some users began noticing that the browser had stopped automatically filling in their saved logins. Even worse, when they tried to access their saved logins using the Firefox password manager, they noticed that the listβ¦
Exposed Docker APIs Abused by DDoS, Cryptojacking Botnet Malware
Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets. [...]
https://www.bleepingcomputer.com/news/security/exposed-docker-apis-abused-by-ddos-cryptojacking-botnet-malware/
Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets. [...]
https://www.bleepingcomputer.com/news/security/exposed-docker-apis-abused-by-ddos-cryptojacking-botnet-malware/
BleepingComputer
Exposed Docker APIs Abused by DDoS, Cryptojacking Botnet Malware
Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building large scale botnets.
Echobot Botnet Spreads via 26 Exploits, Targets Oracle, VMware Apps
A relatively new botnet called Echobot has grown to 26 the number of exploits it uses to propagate. Most of the exploitation code it includes is for unpatched IoT devices, but enterprise apps Oracle WebLogic and VMware SD-Wan are among the targets, too. [...]
https://www.bleepingcomputer.com/news/security/echobot-botnet-spreads-via-26-exploits-targets-oracle-vmware-apps/
A relatively new botnet called Echobot has grown to 26 the number of exploits it uses to propagate. Most of the exploitation code it includes is for unpatched IoT devices, but enterprise apps Oracle WebLogic and VMware SD-Wan are among the targets, too. [...]
https://www.bleepingcomputer.com/news/security/echobot-botnet-spreads-via-26-exploits-targets-oracle-vmware-apps/
BleepingComputer
Echobot Botnet Spreads via 26 Exploits, Targets Oracle, VMware Apps
A relatively new botnet called Echobot has grown to 26 the number of exploits it uses to propagate. Most of the exploitation code it includes is for unpatched IoT devices, but enterprise apps Oracle WebLogic and VMware SD-Wan are among the targets, too.
New WSH RAT Malware Targets Bank Customers with Keyloggers
Security researchers have discovered an ongoing phishing campaign distributing a new remote access trojan (RAT) and actively targeting commercial banking customers with keyloggers and information stealers. [...]
https://www.bleepingcomputer.com/news/security/new-wsh-rat-malware-targets-bank-customers-with-keyloggers/
Security researchers have discovered an ongoing phishing campaign distributing a new remote access trojan (RAT) and actively targeting commercial banking customers with keyloggers and information stealers. [...]
https://www.bleepingcomputer.com/news/security/new-wsh-rat-malware-targets-bank-customers-with-keyloggers/
BleepingComputer
New WSH RAT Malware Targets Bank Customers with Keyloggers
Security researchers have discovered an ongoing phishing campaign distributing a new remote access trojan (RAT) and actively targeting commercial banking customers with keyloggers and information stealers.
New Android Trojan Leads Users to Scam Sites via Notifications
A new Android Trojan that uses website notifications to redirect users to scam and fraudulent sites has been discovered by security researchers on Google's Play Store. [...]
https://www.bleepingcomputer.com/news/security/new-android-trojan-leads-users-to-scam-sites-via-notifications/
A new Android Trojan that uses website notifications to redirect users to scam and fraudulent sites has been discovered by security researchers on Google's Play Store. [...]
https://www.bleepingcomputer.com/news/security/new-android-trojan-leads-users-to-scam-sites-via-notifications/
BleepingComputer
New Android Trojan Leads Users to Scam Sites via Notifications
A new Android Trojan that uses website notifications to redirect users to scam and fraudulent sites has been discovered by security researchers on Google's Play Store.
The Week in Ransomware - June 14th 2019 - pyLocky and GandCrab Cleans Up
This week we saw French law enforcement releasing a decryptor for the pyLocky Ransomware. We also saw a charity in Washington and a airplane manufacturer become infected with ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-14th-2019-pylocky-and-gandcrab-cleans-up/
This week we saw French law enforcement releasing a decryptor for the pyLocky Ransomware. We also saw a charity in Washington and a airplane manufacturer become infected with ransomware. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-14th-2019-pylocky-and-gandcrab-cleans-up/
BleepingComputer
The Week in Ransomware - June 14th 2019 - pyLocky and GandCrab Cleans Up
This week we saw French law enforcement releasing a decryptor for the pyLocky Ransomware. We also saw a charity in Washington and a airplane manufacturer become infected with ransomware.
Three U.S. Universities Disclose Data Breaches Over Two-Day Span
Three U.S. universities have disclosed data breach incidents impacting personally identifiable information of students or employees following unauthorized access to some of their employees' email accounts. [...]
https://www.bleepingcomputer.com/news/security/three-us-universities-disclose-data-breaches-over-two-day-span/
Three U.S. universities have disclosed data breach incidents impacting personally identifiable information of students or employees following unauthorized access to some of their employees' email accounts. [...]
https://www.bleepingcomputer.com/news/security/three-us-universities-disclose-data-breaches-over-two-day-span/
BleepingComputer
Three U.S. Universities Disclose Data Breaches Over Two-Day Span
Three U.S. universities have disclosed data breach incidents impacting personally identifiable information of students or employees following unauthorized access to some of their employees' email accounts.
Google Chrome Canary Flag Makes The Browser a Colorful Mess
Google is testing a new feature in the Chrome Canary builds that allows you to change the colors used by various user interface elements of the browser. This allows users to make the browser and its New Tab Page a colorful mess that some may find amusing, while others find painful. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-canary-flag-makes-the-browser-a-colorful-mess/
Google is testing a new feature in the Chrome Canary builds that allows you to change the colors used by various user interface elements of the browser. This allows users to make the browser and its New Tab Page a colorful mess that some may find amusing, while others find painful. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-canary-flag-makes-the-browser-a-colorful-mess/
BleepingComputer
Google Chrome Canary Flag Makes The Browser a Colorful Mess
Google is testing a new feature in the Chrome Canary builds that allows you to change the colors used by various user interface elements of the browser. This allows users to make the browser and its New Tab Page a colorful mess that some may find amusingβ¦
Windows 10: The Upcoming Features and Improvements in 20H1
Windows 10 20H1 builds are available for Windows Insiders with several new changes, giving us a glimpse of what's coming. In this article, we'll take a closer look at the changes and improvements included in Windows 10 20H1 preview builds. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-the-upcoming-features-and-improvements-in-20h1/
Windows 10 20H1 builds are available for Windows Insiders with several new changes, giving us a glimpse of what's coming. In this article, we'll take a closer look at the changes and improvements included in Windows 10 20H1 preview builds. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-the-upcoming-features-and-improvements-in-20h1/
BleepingComputer
Windows 10: The Upcoming Features and Improvements in 20H1
Windows 10 20H1 builds are available for Windows Insiders with several new changes, giving us a glimpse of what's coming. In this article, we'll take a closer look at the changes and improvements included in Windows 10 20H1 preview builds.
Bella Thorne Tweets Her Nude Photos After Threats From Hacker
Instead of giving in to the threats of a hacker who gained access to actress Bella Thorne's nude photos, Thorne has decided to release them herself on Twitter along with the hacker's messages to her. [...]
https://www.bleepingcomputer.com/news/security/bella-thorne-tweets-her-nude-photos-after-threats-from-hacker/
Instead of giving in to the threats of a hacker who gained access to actress Bella Thorne's nude photos, Thorne has decided to release them herself on Twitter along with the hacker's messages to her. [...]
https://www.bleepingcomputer.com/news/security/bella-thorne-tweets-her-nude-photos-after-threats-from-hacker/
BleepingComputer
Bella Thorne Tweets Her Nude Photos After Threats From Hacker
Instead of giving in to the threats of a hacker who gained access to actress Bella Thorne's nude photos, Thorne has decided to release them herself on Twitter along with the hacker's messages to her.
Phishing Scam Asks You to Login to Read Encrypted Message
A new phishing campaign is underway that pretends to be an alert from your email server that it has received an encrypted message for you. It then prompts you to login to a fake OneDrive site in order to read the message. [...]
https://www.bleepingcomputer.com/news/security/phishing-scam-asks-you-to-login-to-read-encrypted-message/
A new phishing campaign is underway that pretends to be an alert from your email server that it has received an encrypted message for you. It then prompts you to login to a fake OneDrive site in order to read the message. [...]
https://www.bleepingcomputer.com/news/security/phishing-scam-asks-you-to-login-to-read-encrypted-message/
BleepingComputer
Phishing Scam Asks You to Login to Read Encrypted Message
A new phishing campaign is underway that pretends to be an alert from your email server that it has received an encrypted message for you. It then prompts you to login to a fake OneDrive site in order to read the message.
Microsoft Warns about Worm Attacking Exim Servers on Azure
Microsoft issued a warning over the weekend about an active Linux worm that is targeting a recently disclosed Linux Exim mail server vulnerability. Though existing mitigations exist to block the worm functionality of this infection, Microsoft states that Azure servers can still be infected or hacked through this vulnerability. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-about-worm-attacking-exim-servers-on-azure/
Microsoft issued a warning over the weekend about an active Linux worm that is targeting a recently disclosed Linux Exim mail server vulnerability. Though existing mitigations exist to block the worm functionality of this infection, Microsoft states that Azure servers can still be infected or hacked through this vulnerability. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-about-worm-attacking-exim-servers-on-azure/
BleepingComputer
Microsoft Warns about Worm Attacking Exim Servers on Azure
Microsoft issued a warning over the weekend about an active Linux worm that is targeting a recently disclosed Linux Exim mail server vulnerability. Though existing mitigations exist to block the worm functionality of this infection, Microsoft states thatβ¦
Release of GandCrab 5.2 Decryptor Ends a Bad Ransomware Story
In collaboration with law enforcement agencies around the world, Bitdefender has released an updated decryptor for the GandCrab Ransomware that can decrypt files encrypted by versions 1, 4, and 5 through 5.2. [...]
https://www.bleepingcomputer.com/news/security/release-of-gandcrab-52-decryptor-ends-a-bad-ransomware-story/
In collaboration with law enforcement agencies around the world, Bitdefender has released an updated decryptor for the GandCrab Ransomware that can decrypt files encrypted by versions 1, 4, and 5 through 5.2. [...]
https://www.bleepingcomputer.com/news/security/release-of-gandcrab-52-decryptor-ends-a-bad-ransomware-story/
BleepingComputer
Release of GandCrab 5.2 Decryptor Ends a Bad Ransomware Story
In collaboration with law enforcement agencies around the world, Bitdefender has released an updated decryptor for the GandCrab Ransomware that can decrypt files encrypted by versions 1, 4, and 5 through 5.2.
Samsung's Smart TV Malware Scan Reminder Met by User Criticism
Samsung issued a reminder for customers to scan their Internet-connected Smart QLED TVs for malware to prevent malicious campaigns from targeting their devices and use them as part of cyber attacks. [...]
https://www.bleepingcomputer.com/news/security/samsungs-smart-tv-malware-scan-reminder-met-by-user-criticism/
Samsung issued a reminder for customers to scan their Internet-connected Smart QLED TVs for malware to prevent malicious campaigns from targeting their devices and use them as part of cyber attacks. [...]
https://www.bleepingcomputer.com/news/security/samsungs-smart-tv-malware-scan-reminder-met-by-user-criticism/
BleepingComputer
Samsung's Smart TV Malware Scan Reminder Met by User Criticism
Samsung issued a reminder for customers to scan their Internet-connected Smart QLED TVs for malware to prevent malicious campaigns from targeting their devices and use them as part of cyber attacks.
U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert
The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep. [...]
https://www.bleepingcomputer.com/news/security/us-govt-achieves-bluekeep-remote-code-execution-issues-alert/
The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep. [...]
https://www.bleepingcomputer.com/news/security/us-govt-achieves-bluekeep-remote-code-execution-issues-alert/
BleepingComputer
U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert
The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep.