PetrWrap Ransomware Is a Petya Offspring Used in Targeted Attacks
A heavily modified, but "unauthorized" version of the Petya ransomware has been seen by Kaspersky researchers used in targeted attacks on a small number of organizations. [...]
https://www.bleepingcomputer.com/news/security/petrwrap-ransomware-is-a-petya-offspring-used-in-targeted-attacks/
A heavily modified, but "unauthorized" version of the Petya ransomware has been seen by Kaspersky researchers used in targeted attacks on a small number of organizations. [...]
https://www.bleepingcomputer.com/news/security/petrwrap-ransomware-is-a-petya-offspring-used-in-targeted-attacks/
BleepingComputer
PetrWrap Ransomware Is a Petya Offspring Used in Targeted Attacks
A heavily modified, but "unauthorized" version of the Petya ransomware has been seen by Kaspersky researchers used in targeted attacks on a small number of organizations.
Malwarebytes Researchers Hack into Soon-to-be-Launched RaaS Portal
A ransomware author's plans to launch a RaaS portal were foiled last week after security researchers from Malwarebytes managed to infiltrate the crook's command and control server, hosted on a common shared hosting provider. [...]
https://www.bleepingcomputer.com/news/security/malwarebytes-researchers-hack-into-soon-to-be-launched-raas-portal/
A ransomware author's plans to launch a RaaS portal were foiled last week after security researchers from Malwarebytes managed to infiltrate the crook's command and control server, hosted on a common shared hosting provider. [...]
https://www.bleepingcomputer.com/news/security/malwarebytes-researchers-hack-into-soon-to-be-launched-raas-portal/
BleepingComputer
Malwarebytes Researchers Hack into Soon-to-be-Launched RaaS Portal
A ransomware author's plans to launch a RaaS portal were foiled last week after security researchers from Malwarebytes managed to infiltrate the crook's command and control server, hosted on a common shared hosting provider.
Adobe fixes 8 Security Vulnerabilities in Adobe Flash Player & Shockwave Player
Adobe has released updates for Adobe Flash Player and Adobe Shockwave Player that resolves a combined 8 security vulnerabilities. Of these 8 vulnerabilities, 7 of them are rated as Critical because they could lead to information disclosure or remote code execution. [...]
https://www.bleepingcomputer.com/news/security/adobe-fixes-8-security-vulnerabilities-in-adobe-flash-player-andamp-shockwave-player/
Adobe has released updates for Adobe Flash Player and Adobe Shockwave Player that resolves a combined 8 security vulnerabilities. Of these 8 vulnerabilities, 7 of them are rated as Critical because they could lead to information disclosure or remote code execution. [...]
https://www.bleepingcomputer.com/news/security/adobe-fixes-8-security-vulnerabilities-in-adobe-flash-player-andamp-shockwave-player/
BleepingComputer
Adobe fixes 8 Security Vulnerabilities in Adobe Flash Player & Shockwave Player
Adobe has released updates for Adobe Flash Player and Adobe Shockwave Player that resolves a combined 8 security vulnerabilities. Of these 8 vulnerabilities, 7 of them are rated as Critical because they could lead to information disclosure or remote codeβ¦
Chrome 57 Limits Background Tabs Usage to 1% per CPU Core
Starting with Chrome 57, released last week, Google has put a muzzle on the amount of resources background tabs can use. [...]
https://www.bleepingcomputer.com/news/software/chrome-57-limits-background-tabs-usage-to-1-percent-per-cpu-core/
Starting with Chrome 57, released last week, Google has put a muzzle on the amount of resources background tabs can use. [...]
https://www.bleepingcomputer.com/news/software/chrome-57-limits-background-tabs-usage-to-1-percent-per-cpu-core/
BleepingComputer
Chrome 57 Limits Background Tabs Usage to 1% per CPU Core
Starting with Chrome 57, released last week, Google has put a muzzle on the amount of resources background tabs can use.
Microsoft's March 2017 Patch Tuesday Contains 17 Security Updates
Today is the March 2017 Microsoft Patch Tuesday and we have 17 security updates being released by Microsoft. Of these seventeen updates, seven of them are rated as Critical as they allow remote code execution on the affected computer. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-march-2017-patch-tuesday-contains-17-security-updates/
Today is the March 2017 Microsoft Patch Tuesday and we have 17 security updates being released by Microsoft. Of these seventeen updates, seven of them are rated as Critical as they allow remote code execution on the affected computer. [...]
https://www.bleepingcomputer.com/news/microsoft/microsofts-march-2017-patch-tuesday-contains-17-security-updates/
BleepingComputer
Microsoft's March 2017 Patch Tuesday Contains 17 Security Updates
Today is the March 2017 Microsoft Patch Tuesday and we have 17 security updates being released by Microsoft. Of these seventeen updates, seven of them are rated as Critical as they allow remote code execution on the affected computer.
Windows Insider Build 15058 Released for PC
Today Microsoft released Insider Preview Build 15058 to PC insiders on the fast ring, Like the last few releases, this releases focuses on bug fixes and improvements. Unfortunately, no new features added to this release. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15058-released-for-pc/
Today Microsoft released Insider Preview Build 15058 to PC insiders on the fast ring, Like the last few releases, this releases focuses on bug fixes and improvements. Unfortunately, no new features added to this release. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-insider-build-15058-released-for-pc/
BleepingComputer
Windows Insider Build 15058 Released for PC
Today Microsoft released Insider Preview Build 15058 to PC insiders on the fast ring, Like the last few releases, this releases focuses on bug fixes and improvements. Unfortunately, no new features added to this release.
Researchers Hack Accelerometers with Sound Waves
Scientists from two US universities have found a way to attack accelerometers by using sound waves, a technique that has allowed them to spoof accelerometer signals and feed devices and applications with fake data. [...]
https://www.bleepingcomputer.com/news/hardware/researchers-hack-accelerometers-with-sound-waves/
Scientists from two US universities have found a way to attack accelerometers by using sound waves, a technique that has allowed them to spoof accelerometer signals and feed devices and applications with fake data. [...]
https://www.bleepingcomputer.com/news/hardware/researchers-hack-accelerometers-with-sound-waves/
BleepingComputer
Researchers Hack Accelerometers with Sound Waves
Scientists from two US universities have found a way to attack accelerometers by using sound waves, a technique that has allowed them to spoof accelerometer signals and feed devices and applications with fake data.
Headphone Batteries Explode on Flight, Burn Woman's Face and Hands
A woman traveling on a flight from Beijing, China to Melbourne, Australia suffered burns on her face and hands after her battery-powered headphones exploded. [...]
https://www.bleepingcomputer.com/news/hardware/headphone-batteries-explode-on-flight-burn-womans-face-and-hands/
A woman traveling on a flight from Beijing, China to Melbourne, Australia suffered burns on her face and hands after her battery-powered headphones exploded. [...]
https://www.bleepingcomputer.com/news/hardware/headphone-batteries-explode-on-flight-burn-womans-face-and-hands/
BleepingComputer
Headphone Batteries Explode on Flight, Burn Woman's Face and Hands
A woman traveling on a flight from Beijing, China to Melbourne, Australia suffered burns on her face and hands after her battery-powered headphones exploded.
Turkish Hackers Deface Hundreds of Websites and Twitter Accounts
The Turkish-Dutch political conflict has spewed into cyberspace during the past few days as Turkish hackers have defaced hundreds of websites and Twitter accounts with political messages and pictures of Turkish President Recep Tayyip Erdogan. [...]
https://www.bleepingcomputer.com/news/security/turkish-hackers-deface-hundreds-of-websites-and-twitter-accounts/
The Turkish-Dutch political conflict has spewed into cyberspace during the past few days as Turkish hackers have defaced hundreds of websites and Twitter accounts with political messages and pictures of Turkish President Recep Tayyip Erdogan. [...]
https://www.bleepingcomputer.com/news/security/turkish-hackers-deface-hundreds-of-websites-and-twitter-accounts/
BleepingComputer
Turkish Hackers Deface Hundreds of Websites and Twitter Accounts
The Turkish-Dutch political conflict has spewed into cyberspace during the past few days as Turkish hackers have defaced hundreds of websites and Twitter accounts with political messages and pictures of Turkish President Recep Tayyip Erdogan.
US Charges Four Hackers in Yahoo 2014 Security Breach, Including Two FSB Agents
The US Department of Justice (DoJ) charged four suspects today for orchestrating the 2014 Yahoo data breach during which attackers stole details for over 500 million Yahoo users. [...]
https://www.bleepingcomputer.com/news/security/us-charges-four-hackers-in-yahoo-2014-security-breach-including-two-fsb-agents/
The US Department of Justice (DoJ) charged four suspects today for orchestrating the 2014 Yahoo data breach during which attackers stole details for over 500 million Yahoo users. [...]
https://www.bleepingcomputer.com/news/security/us-charges-four-hackers-in-yahoo-2014-security-breach-including-two-fsb-agents/
BleepingComputer
US Charges Four Hackers in Yahoo 2014 Security Breach, Including Two FSB Agents
The US Department of Justice (DoJ) charged four suspects today for orchestrating the 2014 Yahoo data breach during which attackers stole details for over 500 million Yahoo users.
Revenge Ransomware, a CryptoMix Variant, Being Distributed by RIG Exploit Kit
A new CryptoMix variant called Revenge has been discovered by Broad Analysis that is being distributed via the RIG exploit kit. This variant contains many similarities to its predecessor CryptoShield, which is another CryptoMix variant, but includes some minor changes that are described below. [...]
https://www.bleepingcomputer.com/news/security/revenge-ransomware-a-cryptomix-variant-being-distributed-by-rig-exploit-kit/
A new CryptoMix variant called Revenge has been discovered by Broad Analysis that is being distributed via the RIG exploit kit. This variant contains many similarities to its predecessor CryptoShield, which is another CryptoMix variant, but includes some minor changes that are described below. [...]
https://www.bleepingcomputer.com/news/security/revenge-ransomware-a-cryptomix-variant-being-distributed-by-rig-exploit-kit/
BleepingComputer
Revenge Ransomware, a CryptoMix Variant, Being Distributed by RIG Exploit Kit
A new CryptoMix variant called Revenge has been discovered by Broad Analysis that is being distributed via the RIG exploit kit. This variant contains many similarities to its predecessor CryptoShield, which is another CryptoMix variant, but includes someβ¦
Researchers Find Vulnerability in WhatsApp and Telegram's Web Clients
WhatsApp and Telegram have patched their respective web clients against a common security flaw discovered by researchers from Israeli firm Check Point, a security issue that would have allowed an attacker to take over user accounts and spy on conversations or steal user account data. [...]
https://www.bleepingcomputer.com/news/security/researchers-find-vulnerability-in-whatsapp-and-telegrams-web-clients/
WhatsApp and Telegram have patched their respective web clients against a common security flaw discovered by researchers from Israeli firm Check Point, a security issue that would have allowed an attacker to take over user accounts and spy on conversations or steal user account data. [...]
https://www.bleepingcomputer.com/news/security/researchers-find-vulnerability-in-whatsapp-and-telegrams-web-clients/
BleepingComputer
Researchers Find Vulnerability in WhatsApp and Telegram's Web Clients
WhatsApp and Telegram have patched their respective web clients against a common security flaw discovered by researchers from Israeli firm Check Point, a security issue that would have allowed an attacker to take over user accounts and spy on conversationsβ¦
Russian Hacker "Kolypto" Who Worked on Citadel Trojan Extradited to the US
Yesterday, a Russian national accused of helping develop the Citadel banking trojan was arraigned in front of a US judge for the first time, after being extradited from Fredrikstad, Norway. [...]
https://www.bleepingcomputer.com/news/security/russian-hacker-kolypto-who-worked-on-citadel-trojan-extradited-to-the-us/
Yesterday, a Russian national accused of helping develop the Citadel banking trojan was arraigned in front of a US judge for the first time, after being extradited from Fredrikstad, Norway. [...]
https://www.bleepingcomputer.com/news/security/russian-hacker-kolypto-who-worked-on-citadel-trojan-extradited-to-the-us/
BleepingComputer
Russian Hacker "Kolypto" Who Worked on Citadel Trojan Extradited to the US
Yesterday, a Russian national accused of helping develop the Citadel banking trojan was arraigned in front of a US judge for the first time, after being extradited from Fredrikstad, Norway.
Trend: Ransomware Hidden in NSIS Installers Harder to Detect
Ransomware operators have changed tactics again, making the job of security vendors harder once more, as they switched to a new method of packing their malware inside NSIS installers. [...]
https://www.bleepingcomputer.com/news/security/trend-ransomware-hidden-in-nsis-installers-harder-to-detect/
Ransomware operators have changed tactics again, making the job of security vendors harder once more, as they switched to a new method of packing their malware inside NSIS installers. [...]
https://www.bleepingcomputer.com/news/security/trend-ransomware-hidden-in-nsis-installers-harder-to-detect/
BleepingComputer
Trend: Ransomware Hidden in NSIS Installers Harder to Detect
Ransomware operators have changed tactics again, making the job of security vendors harder once more, as they switched to a new method of packing their malware inside NSIS installers.
Windows 10 UAC Bypass Uses Backup and Restore Utility
A new User Access Control (UAC) bypass technique relies on altering Windows registry app paths and using the Backup and Restore utility to load malicious code without any security warning. [...]
https://www.bleepingcomputer.com/news/security/windows-10-uac-bypass-uses-backup-and-restore-utility/
A new User Access Control (UAC) bypass technique relies on altering Windows registry app paths and using the Backup and Restore utility to load malicious code without any security warning. [...]
https://www.bleepingcomputer.com/news/security/windows-10-uac-bypass-uses-backup-and-restore-utility/
BleepingComputer
Windows 10 UAC Bypass Uses Backup and Restore Utility
A new User Access Control (UAC) bypass technique relies on altering Windows registry app paths and using the Backup and Restore utility to load malicious code without any security warning.
Samsung Leaking Customer Information via Shipper's Website
The website of a company handling the shipment of Samsung products is currently leaking data about Samsung customers in an appalling manner. [...]
https://www.bleepingcomputer.com/news/security/samsung-leaking-customer-information-via-shippers-website/
The website of a company handling the shipment of Samsung products is currently leaking data about Samsung customers in an appalling manner. [...]
https://www.bleepingcomputer.com/news/security/samsung-leaking-customer-information-via-shippers-website/
BleepingComputer
Samsung Leaking Customer Information via Shipper's Website
The website of a company handling the shipment of Samsung products is currently leaking data about Samsung customers in an appalling manner.
North Americans Targeted by New MajikPOS Dual Threat Malware
A new POS (Point Of Sale) malware family is targeting payment systems in the US and Canada. Called MajikPOS, this new strain features a modular design and support for many features often found in RAT (Remote Access Trojans), allowing crooks to scout and select which systems they want to infect. [...]
https://www.bleepingcomputer.com/news/security/north-americans-targeted-by-new-majikpos-dual-threat-malware/
A new POS (Point Of Sale) malware family is targeting payment systems in the US and Canada. Called MajikPOS, this new strain features a modular design and support for many features often found in RAT (Remote Access Trojans), allowing crooks to scout and select which systems they want to infect. [...]
https://www.bleepingcomputer.com/news/security/north-americans-targeted-by-new-majikpos-dual-threat-malware/
BleepingComputer
North Americans Targeted by New MajikPOS Dual Threat Malware
A new POS (Point Of Sale) malware family is targeting payment systems in the US and Canada. Called MajikPOS, this new strain features a modular design and support for many features often found in RAT (Remote Access Trojans), allowing crooks to scout and selectβ¦
Another Years-Old Flaw Fixed in the Linux Kernel
The Linux team has patched a "dangerous" vulnerability in the Linux kernel that allowed attackers to elevate their access rights and crash affected systems. [...]
https://www.bleepingcomputer.com/news/security/another-years-old-flaw-fixed-in-the-linux-kernel/
The Linux team has patched a "dangerous" vulnerability in the Linux kernel that allowed attackers to elevate their access rights and crash affected systems. [...]
https://www.bleepingcomputer.com/news/security/another-years-old-flaw-fixed-in-the-linux-kernel/
BleepingComputer
Another Years-Old Flaw Fixed in the Linux Kernel
The Linux team has patched a "dangerous" vulnerability in the Linux kernel that allowed attackers to elevate their access rights and crash affected systems.
Tech Support Scam Synchs Alerts with App Crashes in Windows Event Logs
An application named Event Monitor is a tech support scam with a twist, working by monitoring the Windows event logs, and showing a popup with an alarming message every time it detects an app crash. [...]
https://www.bleepingcomputer.com/news/security/tech-support-scam-synchs-alerts-with-app-crashes-in-windows-event-logs/
An application named Event Monitor is a tech support scam with a twist, working by monitoring the Windows event logs, and showing a popup with an alarming message every time it detects an app crash. [...]
https://www.bleepingcomputer.com/news/security/tech-support-scam-synchs-alerts-with-app-crashes-in-windows-event-logs/
BleepingComputer
Tech Support Scam Synchs Alerts with App Crashes in Windows Event Logs
An application named Event Monitor is a tech support scam with a twist, working by monitoring the Windows event logs, and showing a popup with an alarming message every time it detects an app crash.
Microsoft Forces Owners of Recent CPU Architectures to Use Windows 10
Users of new CPU architectures will not receive Windows 7 and 8.1 updates anymore, according to a Microsoft support topic published last week. [...]
https://www.bleepingcomputer.com/news/hardware/microsoft-forces-owners-of-recent-cpu-architectures-to-use-windows-10/
Users of new CPU architectures will not receive Windows 7 and 8.1 updates anymore, according to a Microsoft support topic published last week. [...]
https://www.bleepingcomputer.com/news/hardware/microsoft-forces-owners-of-recent-cpu-architectures-to-use-windows-10/
BleepingComputer
Microsoft Forces Owners of Recent CPU Architectures to Use Windows 10
Users of new CPU architectures will not receive Windows 7 and 8.1 updates anymore, according to a Microsoft support topic published last week.