Microsoft's New Edge Browser Released, What You Need to Know
The Chromium-based Microsoft Edge is now available for download. The new Edge ditches Microsoft's home-grown EdgeHTML rendering engine for Google's open-sourced platform called 'Chromium' and Blink rendering engine. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-new-edge-browser-released-what-you-need-to-know/
The Chromium-based Microsoft Edge is now available for download. The new Edge ditches Microsoft's home-grown EdgeHTML rendering engine for Google's open-sourced platform called 'Chromium' and Blink rendering engine. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-new-edge-browser-released-what-you-need-to-know/
BleepingComputer
Microsoft's New Edge Browser Released, What You Need to Know
The Chromium-based Microsoft Edge is now available for download. The new Edge ditches Microsoft's home-grown EdgeHTML rendering engine for Google's open-sourced platform called 'Chromium' and Blink rendering engine.
Microsoft's Indexer Diagnostics Helps Troubleshoot Windows Search
Microsoft released an Indexer Diagnostics utility to help users troubleshoot and, in some cases, fix Windows Search problems they might experience on their Windows 10 devices. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-indexer-diagnostics-helps-troubleshoot-windows-search/
Microsoft released an Indexer Diagnostics utility to help users troubleshoot and, in some cases, fix Windows Search problems they might experience on their Windows 10 devices. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-indexer-diagnostics-helps-troubleshoot-windows-search/
BleepingComputer
Microsoft's Indexer Diagnostics Helps Troubleshoot Windows Search
Microsoft released an Indexer Diagnostics utility to help users troubleshoot and, in some cases, fix Windows Search problems they might experience on their Windows 10 devices.
iPhones Can Now Double As a Security Key for Google Accounts
Google announced that iPhones running iOS 10 or later can now be used as security keys to protect Google accounts against phishing attacks by verifying sign-ins on Chrome OS, iOS, macOS and Windows 10 devices without pairing. [...]
https://www.bleepingcomputer.com/news/security/iphones-can-now-double-as-a-security-key-for-google-accounts/
Google announced that iPhones running iOS 10 or later can now be used as security keys to protect Google accounts against phishing attacks by verifying sign-ins on Chrome OS, iOS, macOS and Windows 10 devices without pairing. [...]
https://www.bleepingcomputer.com/news/security/iphones-can-now-double-as-a-security-key-for-google-accounts/
BleepingComputer
iPhones Can Now Double As a Security Key for Google Accounts
Google announced that iPhones running iOS 10 or later can now be used as security keys to protect Google accounts against phishing attacks by verifying sign-ins on Chrome OS, iOS, macOS and Windows 10 devices without pairing.
Online Pharmacy PlanetDrugsDirect Discloses Security Breach
Canadian online pharmacy PlanetDrugsDirect is emailing customers, notifying them of a data security incident that might have impacted some of their sensitive personal and financial information. [...]
https://www.bleepingcomputer.com/news/security/online-pharmacy-planetdrugsdirect-discloses-security-breach/
Canadian online pharmacy PlanetDrugsDirect is emailing customers, notifying them of a data security incident that might have impacted some of their sensitive personal and financial information. [...]
https://www.bleepingcomputer.com/news/security/online-pharmacy-planetdrugsdirect-discloses-security-breach/
BleepingComputer
Online Pharmacy PlanetDrugsDirect Discloses Security Breach
Canadian online pharmacy PlanetDrugsDirect is emailing customers, notifying them of a data security incident that might have impacted some of their sensitive personal and financial information.
Ako Ransomware Uses Spam to Infect Its Victims
It has been discovered that the network-targeting Ako ransomware is being distributed through malicious spam attachments that pretend to be a requested agreement. [...]
https://www.bleepingcomputer.com/news/security/ako-ransomware-uses-spam-to-infect-its-victims/
It has been discovered that the network-targeting Ako ransomware is being distributed through malicious spam attachments that pretend to be a requested agreement. [...]
https://www.bleepingcomputer.com/news/security/ako-ransomware-uses-spam-to-infect-its-victims/
BleepingComputer
Ako Ransomware Uses Spam to Infect Its Victims
It has been discovered that the network-targeting Ako ransomware is being distributed through malicious spam attachments that pretend to be a requested agreement.
Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII
P&Nβ Bank in West Australia (WA) is informing its customers that hackers may have accessed personal information stored on its systems following a cyber attack. [...]
https://www.bleepingcomputer.com/news/security/customer-owned-bank-informs-100k-of-breach-exposing-account-balance-pii/
P&Nβ Bank in West Australia (WA) is informing its customers that hackers may have accessed personal information stored on its systems following a cyber attack. [...]
https://www.bleepingcomputer.com/news/security/customer-owned-bank-informs-100k-of-breach-exposing-account-balance-pii/
BleepingComputer
Customer-Owned Bank Informs 100k of Breach Exposing Account Balance, PII
P&Nβ Bank in West Australia (WA) is informing its customers that hackers may have accessed personal information stored on its systems following a cyber attack.
Google to Kill Chrome Apps Across All Platforms
Google announced that it will slowly phase out support for Chrome apps on all operating systems until they will completely stop working in June 2022 for all users. [...]
https://www.bleepingcomputer.com/news/google/google-to-kill-chrome-apps-across-all-platforms/
Google announced that it will slowly phase out support for Chrome apps on all operating systems until they will completely stop working in June 2022 for all users. [...]
https://www.bleepingcomputer.com/news/google/google-to-kill-chrome-apps-across-all-platforms/
BleepingComputer
Google to Kill Chrome Apps Across All Platforms
Google announced that it will slowly phase out support for Chrome apps on all operating systems until they will completely stop working in June 2022 for all users.
PoCs for Windows CryptoAPI Bug Are Out, Show Real-Life Exploit Risks
Proof-of-concept exploit code is now available for the Windows CryptoAPI spoofing vulnerability tracked as CVE-2020-0601 and reported by the National Security Agency (NSA), just two days after Microsoft released a patch. [...]
https://www.bleepingcomputer.com/news/security/pocs-for-windows-cryptoapi-bug-are-out-show-real-life-exploit-risks/
Proof-of-concept exploit code is now available for the Windows CryptoAPI spoofing vulnerability tracked as CVE-2020-0601 and reported by the National Security Agency (NSA), just two days after Microsoft released a patch. [...]
https://www.bleepingcomputer.com/news/security/pocs-for-windows-cryptoapi-bug-are-out-show-real-life-exploit-risks/
BleepingComputer
PoCs for Windows CryptoAPI Bug Are Out, Show Real-Life Exploit Risks
Proof-of-concept exploit code is now available for the Windows CryptoAPI spoofing vulnerability tracked as CVE-2020-0601 and reported by the National Security Agency (NSA), just two days after Microsoft released a patch.
TrickBot Now Uses a Windows 10 UAC Bypass to Evade Detection
The TrickBot Trojan has received an update that adds a UAC bypass targeting the Windows 10 operating system so that it infects users without displaying any visible prompts. [...]
https://www.bleepingcomputer.com/news/security/trickbot-now-uses-a-windows-10-uac-bypass-to-evade-detection/
The TrickBot Trojan has received an update that adds a UAC bypass targeting the Windows 10 operating system so that it infects users without displaying any visible prompts. [...]
https://www.bleepingcomputer.com/news/security/trickbot-now-uses-a-windows-10-uac-bypass-to-evade-detection/
BleepingComputer
TrickBot Now Uses a Windows 10 UAC Bypass to Evade Detection
The TrickBot Trojan has received an update that adds a UAC bypass targeting the Windows 10 operating system so that it infects users without displaying any visible prompts.
WordPress Plugin Bugs Let Hackers Wipe or Takeover Your Site
Critical bugs found in the WordPress Database Reset plugin used by over 80,000 sites allow attackers to drop all users and get automatically elevated to an administrator role and to reset any table in the database. [...]
https://www.bleepingcomputer.com/news/security/wordpress-plugin-bugs-let-hackers-wipe-or-takeover-your-site/
Critical bugs found in the WordPress Database Reset plugin used by over 80,000 sites allow attackers to drop all users and get automatically elevated to an administrator role and to reset any table in the database. [...]
https://www.bleepingcomputer.com/news/security/wordpress-plugin-bugs-let-hackers-wipe-or-takeover-your-site/
BleepingComputer
WordPress Plugin Bugs Let Hackers Wipe or Takeover Your Site
Critical bugs found in the WordPress Database Reset plugin used by over 80,000 sites allow attackers to drop all users and get automatically elevated to an administrator role and to reset any table in the database.
Google Chrome Adds Protection for NSA's Windows CryptoAPI Flaw
Google just released Chrome 79.0.3945.130, which will now detect certificates that attempt to exploit the NSA discovered CVE-2020-0601 CryptoAPI Windows vulnerability. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-adds-protection-for-nsas-windows-cryptoapi-flaw/
Google just released Chrome 79.0.3945.130, which will now detect certificates that attempt to exploit the NSA discovered CVE-2020-0601 CryptoAPI Windows vulnerability. [...]
https://www.bleepingcomputer.com/news/security/google-chrome-adds-protection-for-nsas-windows-cryptoapi-flaw/
BleepingComputer
Google Chrome Adds Protection for NSA's Windows CryptoAPI Flaw
Google just released Chrome 79.0.3945.130, which will now detect certificates that attempt to exploit the NSA discovered CVE-2020-0601 CryptoAPI Windows vulnerability.
FBI to Warn State Officials of Election Infrastructure Cyber Threats
The Federal Bureau of Investigation (FBI) today announced a change in policy requiring the timely notification of state officials of potential cyber threats to election infrastructure. [...]
https://www.bleepingcomputer.com/news/security/fbi-to-warn-state-officials-of-election-infrastructure-cyber-threats/
The Federal Bureau of Investigation (FBI) today announced a change in policy requiring the timely notification of state officials of potential cyber threats to election infrastructure. [...]
https://www.bleepingcomputer.com/news/security/fbi-to-warn-state-officials-of-election-infrastructure-cyber-threats/
BleepingComputer
FBI to Warn State Officials of Election Infrastructure Cyber Threats
The Federal Bureau of Investigation (FBI) today announced a change in policy requiring the timely notification of state officials of potential cyber threats to election infrastructure.
Windows 10 Insider Build 19546 Adds Graphing Mode to Calculator
Microsoft has released Windows 10 Insider Preview Build 19546 to Insiders in the Fast ring, which has added a new Graphing Mode to the Windows Calculator and fixed bugs in Timeline, Outlook search, and more. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-19546-adds-graphing-mode-to-calculator/
Microsoft has released Windows 10 Insider Preview Build 19546 to Insiders in the Fast ring, which has added a new Graphing Mode to the Windows Calculator and fixed bugs in Timeline, Outlook search, and more. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-19546-adds-graphing-mode-to-calculator/
BleepingComputer
Windows 10 Insider Build 19546 Adds Graphing Mode to Calculator
Microsoft has released Windows 10 Insider Preview Build 19546 to Insiders in the Fast ring, which has added a new Graphing Mode to the Windows Calculator and fixed bugs in Timeline, Outlook search, and more.
Dutch Govt Suggests Turning Off Citrix ADC Devices, Mitigations May Fail
Mitigation recommendations for CVE-2019-19781, a currently unpatched critical flaw affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway, do not have the expected effect on all product versions. [...]
https://www.bleepingcomputer.com/news/security/dutch-govt-suggests-turning-off-citrix-adc-devices-mitigations-may-fail/
Mitigation recommendations for CVE-2019-19781, a currently unpatched critical flaw affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway, do not have the expected effect on all product versions. [...]
https://www.bleepingcomputer.com/news/security/dutch-govt-suggests-turning-off-citrix-adc-devices-mitigations-may-fail/
BleepingComputer
Dutch Govt Suggests Turning Off Citrix ADC Devices, Mitigations May Fail
Mitigation recommendations for CVE-2019-19781, a currently unpatched critical flaw affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway, do not have the expected effect on all product versions.
FBI Seize WeLeakInfo.com For Selling Info From Data Breaches
As a clear indication of how law enforcement views the commercial disclosure of stolen information, the FBI has seized the WeLeakInfo.com domain for selling subscriptions to data exposed in breaches. [...]
https://www.bleepingcomputer.com/news/security/fbi-seize-weleakinfocom-for-selling-info-from-data-breaches/
As a clear indication of how law enforcement views the commercial disclosure of stolen information, the FBI has seized the WeLeakInfo.com domain for selling subscriptions to data exposed in breaches. [...]
https://www.bleepingcomputer.com/news/security/fbi-seize-weleakinfocom-for-selling-info-from-data-breaches/
BleepingComputer
FBI Seize WeLeakInfo.com For Selling Info From Data Breaches
As a clear indication of how law enforcement views the commercial disclosure of stolen information, the FBI has seized the WeLeakInfo.com domain for selling subscriptions to data exposed in breaches.
Fraudsters Set Up Site Selling Temporary Social Security Numbers
Some fraudsters have set up a scam site claiming to be for a data protection fund created by the U.S. Federal Trading Commission (FTC) to offer financial compensation to users whose personal data appeared in information leaks. [...]
https://www.bleepingcomputer.com/news/security/fraudsters-set-up-site-selling-temporary-social-security-numbers/
Some fraudsters have set up a scam site claiming to be for a data protection fund created by the U.S. Federal Trading Commission (FTC) to offer financial compensation to users whose personal data appeared in information leaks. [...]
https://www.bleepingcomputer.com/news/security/fraudsters-set-up-site-selling-temporary-social-security-numbers/
BleepingComputer
Fraudsters Set Up Site Selling Temporary Social Security Numbers
Some fraudsters have set up a scam site claiming to be for a data protection fund created by the U.S. Federal Trading Commission (FTC) to offer financial compensation to users whose personal data appeared in information leaks.
Hackers Are Securing Citrix Servers, Backdoor Them for Access
An unknown threat actor is currently scanning for and securing vulnerable Citrix ADC servers against CVE-2019-19781 exploitation attempts, while also backdooring them for future access. [...]
https://www.bleepingcomputer.com/news/security/hackers-are-securing-citrix-servers-backdoor-them-for-access/
An unknown threat actor is currently scanning for and securing vulnerable Citrix ADC servers against CVE-2019-19781 exploitation attempts, while also backdooring them for future access. [...]
https://www.bleepingcomputer.com/news/security/hackers-are-securing-citrix-servers-backdoor-them-for-access/
BleepingComputer
Hackers Are Securing Citrix Servers, Backdoor Them for Access
An unknown threat actor is currently scanning for and securing vulnerable Citrix ADC servers against CVE-2019-19781 exploitation attempts, while also backdooring them for future access.
FBI Says State Actors Hacked US Govt Network With Pulse VPN Flaw
FBI said in a flash security alert that nation-state actors have breached the networks of a US municipal government and a US financial entity by exploiting a critical vulnerability affecting Pulse Secure VPN servers. [...]
https://www.bleepingcomputer.com/news/security/fbi-says-state-actors-hacked-us-govt-network-with-pulse-vpn-flaw/
FBI said in a flash security alert that nation-state actors have breached the networks of a US municipal government and a US financial entity by exploiting a critical vulnerability affecting Pulse Secure VPN servers. [...]
https://www.bleepingcomputer.com/news/security/fbi-says-state-actors-hacked-us-govt-network-with-pulse-vpn-flaw/
BleepingComputer
FBI Says State Actors Hacked US Govt Network With Pulse VPN Flaw
FBI said in a flash security alert that nation-state actors have breached the networks of a US municipal government and a US financial entity by exploiting a critical vulnerability affecting Pulse Secure VPN servers.
How Malware Gains Trust by Abusing the Windows CryptoAPI Flaw
The new Windows CryptoAPI CVE-2020-0601 vulnerability disclosed by the NSA can be abused by malware developers to sign their executables so that they appear to be from legitimate companies. This creates trust in the program, which may cause a user to be more willing to execute them. [...]
https://www.bleepingcomputer.com/news/security/how-malware-gains-trust-by-abusing-the-windows-cryptoapi-flaw/
The new Windows CryptoAPI CVE-2020-0601 vulnerability disclosed by the NSA can be abused by malware developers to sign their executables so that they appear to be from legitimate companies. This creates trust in the program, which may cause a user to be more willing to execute them. [...]
https://www.bleepingcomputer.com/news/security/how-malware-gains-trust-by-abusing-the-windows-cryptoapi-flaw/
BleepingComputer
How Malware Gains Trust by Abusing the Windows CryptoAPI Flaw
The new Windows CryptoAPI CVE-2020-0601 vulnerability disclosed by the NSA can be abused by malware developers to sign their executables so that they appear to be from legitimate companies. This creates trust in the program, which may cause a user to be moreβ¦
New US Bill Wants to Assign State Cybersecurity Coordinators
Four U.S. Senators have introduced a bipartisan bill that will require the Department of Homeland Security (DHS) to appoint cybersecurity effort coordinators in every state to orchestrate cyberattack response and remediation efforts, and to improve coordination between federal, state, and local entities. [...]
https://www.bleepingcomputer.com/news/security/new-us-bill-wants-to-assign-state-cybersecurity-coordinators/
Four U.S. Senators have introduced a bipartisan bill that will require the Department of Homeland Security (DHS) to appoint cybersecurity effort coordinators in every state to orchestrate cyberattack response and remediation efforts, and to improve coordination between federal, state, and local entities. [...]
https://www.bleepingcomputer.com/news/security/new-us-bill-wants-to-assign-state-cybersecurity-coordinators/
BleepingComputer
New US Bill Wants to Assign State Cybersecurity Coordinators
Four U.S. Senators have introduced a bipartisan bill that will require the Department of Homeland Security (DHS) to appoint cybersecurity effort coordinators in every state to orchestrate cyberattack response and remediation efforts, and to improve coordinationβ¦
The Week in Ransomware - January 17th 2020 - Never Ends
Data exfiltration is still the big thing this week, with the Sodinokibi Ransomware publishing stolen files of one of their victims for the first time and Nemty planning on leaking stolen files as well. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-17th-2020-never-ends/
Data exfiltration is still the big thing this week, with the Sodinokibi Ransomware publishing stolen files of one of their victims for the first time and Nemty planning on leaking stolen files as well. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-17th-2020-never-ends/
BleepingComputer
The Week in Ransomware - January 17th 2020 - Never Ends
Data exfiltration is still the big thing this week, with the Sodinokibi Ransomware publishing stolen files of one of their victims for the first time and Nemty planning on leaking stolen files as well.