Security News

122 Pins4 Followers
Weekly security report: February 12 – February 16 - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals

Weekly security report: February 12 – February 16 - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals

Famous people and Twitter are used by #cybercriminals to steal your crypto coins - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Famous people like Elon Musk, Donald Trump, Justin Sun, tech CEOs, and other big names are used on Twitter in various scams involving cryptocurrency give away. Anyone who wants to get the offered cryptocurrency, have to invest some money int

Famous people and Twitter are used by #cybercriminals to steal your crypto coins - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Famous people like Elon Musk, Donald Trump, Justin Sun, tech CEOs, and other big names are used on Twitter in various scams involving cryptocurrency give away. Anyone who wants to get the offered cryptocurrency, have to invest some money int

New #Skype flaw can be used by #cybercriminals to gain full access to your device -  #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Updater process of Skype allows cybercriminals to gain admin privileges to any vulnerable computer. This flaw can be used to obtain full admin privileges from a local unprivileged user. The problem with this flaw is that it can not be re

New #Skype flaw can be used by #cybercriminals to gain full access to your device - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Updater process of Skype allows cybercriminals to gain admin privileges to any vulnerable computer. This flaw can be used to obtain full admin privileges from a local unprivileged user. The problem with this flaw is that it can not be re

New version of #Rapid #Ransomware spotted in the #cyberspace - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Internal Revenue Service name is used to distribute a new variant of Rapid Ransomware through malspam. The campaign affects countries like U.S, UK, and Germany. Mails used in this campaign have subjects like Please Note - IRS Urgent Message-164 and are containi

New version of #Rapid #Ransomware spotted in the #cyberspace - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Internal Revenue Service name is used to distribute a new variant of Rapid Ransomware through malspam. The campaign affects countries like U.S, UK, and Germany. Mails used in this campaign have subjects like Please Note - IRS Urgent Message-164 and are containi

#Telegram 0-day exploit is used by Russian #hackers to deliver crypto miners - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Cryptocurrency mining malware can now be installed into victims devices by using a zero-day vulnerability in the Windows client for the Telegram instant messaging service. This zero-day stays in the way of how the Telegram Windows client handles

#Telegram 0-day exploit is used by Russian #hackers to deliver crypto miners - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Cryptocurrency mining malware can now be installed into victims devices by using a zero-day vulnerability in the Windows client for the Telegram instant messaging service. This zero-day stays in the way of how the Telegram Windows client handles

A new version of #AndroRAT #malware can control your entire smartphone - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals There is a new version of the AndroRAT malware spotted in the wild. It can inject root exploits to perform malicious tasks. This time the vulnerability CVE-2015-1805 it is abused to obtain privilege escalation on older Android devices.

A new version of #AndroRAT #malware can control your entire smartphone - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals There is a new version of the AndroRAT malware spotted in the wild. It can inject root exploits to perform malicious tasks. This time the vulnerability CVE-2015-1805 it is abused to obtain privilege escalation on older Android devices.

IP Webcams are the new trend inside security world, but they also can be the weak point of your network - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime  Security cameras are now part of IoT meaning that they can be operated by connecting them directly to the internet. This has the following pro aspects: the costs are lower for their use meaning that many end users can bring them with

IP Webcams are the new trend inside security world, but they also can be the weak point of your network - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime Security cameras are now part of IoT meaning that they can be operated by connecting them directly to the internet. This has the following pro aspects: the costs are lower for their use meaning that many end users can bring them with

#LockCrypt #Ransomware can encrypt your data for good - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals One hack leads to another hack. Today hacked remote desktop services are used to distribute LockCrypt Ransomware. When it is installed, LockCrypt will encrypt all files from the infected device with .1btc extension. This LockCrypt Ransomware is very similar to an old

#LockCrypt #Ransomware can encrypt your data for good - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals One hack leads to another hack. Today hacked remote desktop services are used to distribute LockCrypt Ransomware. When it is installed, LockCrypt will encrypt all files from the infected device with .1btc extension. This LockCrypt Ransomware is very similar to an old

New #MacOS #TrojanRat named #ColdRoot - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Most antivirus engines are still unable to detect a remote access trojan named Coldroot. This RAT started as a joke: to Play with Mac users and in time it managed to reach all other OSes - Linux and Windows.

New #MacOS #TrojanRat named #ColdRoot - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Most antivirus engines are still unable to detect a remote access trojan named Coldroot. This RAT started as a joke: to Play with Mac users and in time it managed to reach all other OSes - Linux and Windows.

#Android struggles to improve its #cybersecurity #defense #mechanisms - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals In 2017 nearly 343 new malware versions were discovered every hour for Android systems only, that means over 3 million unique malware targeted Android devices last year. The number of total infections is with 250.000 smaller than the number of 2016, sa

#Android struggles to improve its #cybersecurity #defense #mechanisms - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals In 2017 nearly 343 new malware versions were discovered every hour for Android systems only, that means over 3 million unique malware targeted Android devices last year. The number of total infections is with 250.000 smaller than the number of 2016, sa

#Edge web browser exposed again by #Google Project Zero -  #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Google Project Zero has made another victim; it's time for Edge web browser to be exposed by Google because Microsoft failed to patch a vulnerability within a 90 day period. Microsoft added to Edge in Windows 10 Creators Update two feature named Arbitrary Code Gu

#Edge web browser exposed again by #Google Project Zero - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Google Project Zero has made another victim; it's time for Edge web browser to be exposed by Google because Microsoft failed to patch a vulnerability within a 90 day period. Microsoft added to Edge in Windows 10 Creators Update two feature named Arbitrary Code Gu

If you are using #APFS #sparse disk images, your data might end up going corrupt and inaccessible - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals APFS sparse disk images are handled improperly by macOS and because of this data may be copied in the void which will lead to data loss. This issue affects only disk image files formatted in Apple's new filesystem format APF

If you are using #APFS #sparse disk images, your data might end up going corrupt and inaccessible - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals APFS sparse disk images are handled improperly by macOS and because of this data may be copied in the void which will lead to data loss. This issue affects only disk image files formatted in Apple's new filesystem format APF

New #malware can #bypass #Anti-Malware Scan Interface #AMSI available on Windows 10 - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Anti-Malware Scan Interface (AMSI) available on Windows 10 fails to detect a malware that uses a null character in its code. This vulnerability affects AMSI Windows 10 security feature. AMSI was first used in Windows 10, and the function

New #malware can #bypass #Anti-Malware Scan Interface #AMSI available on Windows 10 - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Anti-Malware Scan Interface (AMSI) available on Windows 10 fails to detect a malware that uses a null character in its code. This vulnerability affects AMSI Windows 10 security feature. AMSI was first used in Windows 10, and the function

#Report about #cyber #attacks made against banks in 2017 - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Cybercriminals steal millions of dollars from banks in Russia and India by exploiting SWIFT global banking network. Our cybersecurity team released a report regarding types of attacks that affected financial institutions in 2017.

#Report about #cyber #attacks made against banks in 2017 - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Cybercriminals steal millions of dollars from banks in Russia and India by exploiting SWIFT global banking network. Our cybersecurity team released a report regarding types of attacks that affected financial institutions in 2017.

The #Coinhoarder #phishing #campaign made #cybercriminals behind it $50 million richer - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals The Coinhoarder campaign is a Bitcoin phishing operation that made cybercriminals behind it richer with $50 million. Coinhoarder was first spotted in February last year, this campaign, hosted in Ukraine, was used to target popular Bitc

The #Coinhoarder #phishing #campaign made #cybercriminals behind it $50 million richer - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals The Coinhoarder campaign is a Bitcoin phishing operation that made cybercriminals behind it richer with $50 million. Coinhoarder was first spotted in February last year, this campaign, hosted in Ukraine, was used to target popular Bitc

Most dangerous #malware threats - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Crypto-mining malware is affecting about 23% of companies available worldwide. The Coinhive variants will grow even more in 2018. In our top 10 most prolific malware threats there are three crypto-mining code variants. Coinhive is infecting one in five companies, JSEcoin

Most dangerous #malware threats - #CyberSecurity #CyberAware #CyberNews #Infosec #cyberdefence #cyberattack #tech #technology #hacker #hacking #cybertrends #apt #cybercrime #cybercriminals Crypto-mining malware is affecting about 23% of companies available worldwide. The Coinhive variants will grow even more in 2018. In our top 10 most prolific malware threats there are three crypto-mining code variants. Coinhive is infecting one in five companies, JSEcoin

Pinterest
Search