Online Security
2 min read
44

The Vulnerabilities of the Past Are the Vulnerabilities of the Future

June 4, 2021
0

Major software vulnerabilities are a fact of life, as illustrated by the fact that Microsoft has patched between 55 and 110 vulnerabilities each month this year – with 7% to 17% of those vulnerabilities being critical. May had the fewest vulnerabilities, with a total of 55 and only four considered

Continue Reading
Online Security
1 min read
47

Cybercriminals Hold $115,000-Prize Contest to Find New Cryptocurrency Hacks

June 3, 2021
0

A top Russian-language underground forum has been running a “contest” for the past month, calling on its community to submit “unorthodox” ways to conduct cryptocurrency attacks. The forum’s administrator, in an announcement made on April 20, 2021, invited members to submit papers that assess the possibility of targeting cryptocurrency-related technology,

Continue Reading
Online Security
1 min read
37

Malware Can Use This Trick to Bypass Ransomware Defense in Antivirus Solutions

June 2, 2021
0

Researchers have disclosed significant security weaknesses in popular software applications that could be abused to deactivate their protections and take control of allow-listed applications to perform nefarious operations on behalf of the malware to defeat anti-ransomware defenses. The twin attacks, detailed by academics from the University of Luxembourg and the

Continue Reading
Online Security
1 min read
44

Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors

June 1, 2021
0

Starting June 8, Amazon will automatically enable a feature on your Alexa, Echo, or other Amazon device that will share some of your Internet bandwidth with your neighbors—unless you choose to opt out. Amazon intends to register its family of hardware devices that are operational in the U.S.—including Echo speakers,

Continue Reading
Online Security
1 min read
56

Chinese Cyber Espionage Hackers Continue to Target Pulse Secure VPN Devices

May 31, 2021
0

Cybersecurity researchers from FireEye unmasked additional tactics, techniques, and procedures (TTPs) adopted by Chinese threat actors who were recently found abusing Pulse Secure VPN devices to drop malicious web shells and exfiltrate sensitive information from enterprise networks. FireEye’s Mandiant threat intelligence team, which is tracking the cyber espionage activity under

Continue Reading
Online Security
1 min read
41

Researchers Demonstrate 2 New Hacks to Modify Certified PDF Documents

May 30, 2021
0

Cybersecurity researchers have disclosed two new attack techniques on certified PDF documents that could potentially enable an attacker to alter a document’s visible content by displaying malicious content over the certified content without invalidating its signature. “The attack idea exploits the flexibility of PDF certification, which allows signing or adding

Continue Reading
Online Security
1 min read
41

Researchers Warn of Facefish Backdoor Spreading Linux Rootkits

May 29, 2021
0

Cybersecurity researchers have disclosed a new backdoor program capable of stealing user login credentials, device information and executing arbitrary commands on Linux systems. The malware dropper has been dubbed “Facefish” by Qihoo 360 NETLAB team owing its capabilities to deliver different rootkits at different times and the use of Blowfish

Continue Reading
Online Security
2 min read
41

Malvertising Campaign On Google Distributed Trojanized AnyDesk Installer

May 28, 2021
0

Cybersecurity researchers on Wednesday publicized the disruption of a “clever” malvertising network targeting AnyDesk that delivered a weaponized installer of the remote desktop software via rogue Google ads that appeared in the search engine results pages. The campaign, which is believed to have begun as early as April 21, 2021,

Continue Reading
Online Security
1 min read
41

Data Wiper Malware Disguised As Ransomware Targets Israeli Entities

May 27, 2021
0

Researchers on Tuesday disclosed a new espionage campaign that resorts to destructive data-wiping attacks targeting Israeli entities at least since December 2020 that camouflage the malicious activity as ransomware extortions. Cybersecurity firm SentinelOne attributed the attacks to a nation-state actor affiliated with Iran it tracks under the moniker “Agrius.” “An

Continue Reading
Online Security
2 min read
38

New High-Severity Vulnerability Reported in Pulse Connect Secure VPN

May 26, 2021
0

Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an authenticated remote attacker to execute arbitrary code with elevated privileges. “Buffer Overflow in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse

Continue Reading
Online Security
1 min read
40

What To Do When Your Business Is Hacked

May 25, 2021
0

As businesses move to a remote workforce, hackers have increased their activity to capitalize on new security holes. Cybercriminals often use unsophisticated methods that continue to be extremely successful. These include phishing emails to harvest credentials and gain easy access to business-critical environments. Hackers are also using ransomware to hold

Continue Reading
Online Security
1 min read
49

Air India Hack Exposes Credit Card and Passport Info of 4.5 Million Passengers

May 24, 2021
0

India’s flag carrier airline, Air India, has disclosed a data breach affecting 4.5 million of its customers over a period stretching nearly 10 years after its Passenger Service System (PSS) provider SITA fell victim to a cyber attack earlier this year. The breach involves personal data registered between Aug. 26,

Continue Reading
Online Security
1 min read
59

FBI Analyst Charged With Stealing Counterterrorism and Cyber Threat Info

May 23, 2021
0

The U.S. Department of Justice (DoJ) indicted an employee of the Federal Bureau of Investigation (FBI) for illegally removing numerous national security documents and willfully retaining them at her personal residence during a 13-year period from June 2004 to December 2017. The federal indictment charged Kendra Kingsbury, 48, with two

Continue Reading
Online Security
1 min read
49

Insurance Firm CNA Financial Reportedly Paid Hackers $40 Million in Ransom

May 22, 2021
0

U.S. insurance giant CNA Financial reportedly paid $40 million to a ransomware gang to recover access to its systems following an attack in March, making it one the most expensive ransoms paid to date. The development was first reported by Bloomberg, citing “people with knowledge of the attack.” The adversary

Continue Reading
Online Security
1 min read
40

23 Android Apps Expose Over 100,000,000 Users’ Personal Data

May 21, 2021
0

Misconfigurations in multiple Android apps leaked sensitive data of more than 100 million users, potentially making them a lucrative target for malicious actors. “By not following best-practices when configuring and integrating third-party cloud-services into applications, millions of users’ private data was exposed,” Check Point researchers said in an analysis published

Continue Reading
Online Security
1 min read
38

DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months

May 20, 2021
0

DarkSide, the hacker group behind the Colonial Pipeline ransomware attack earlier this month, received $90 million in bitcoin payments following a nine-month ransomware spree, making it one of the most profitable cybercrime groups. “In total, just over $90 million in bitcoin ransom payments were made to DarkSide, originating from 47

Continue Reading
Online Security
1 min read
45

How Apple Gave Chinese Government Access to iCloud Data and Censored Apps

May 19, 2021
0

In July 2018, when Guizhou-Cloud Big Data (GCBD) agreed to a deal with state-owned telco China Telecom to move users’ iCloud data belonging to Apple’s China-based users to the latter’s servers, the shift raised concerns that it could make user data vulnerable to state surveillance. Now, according to a deep-dive

Continue Reading
Online Security
1 min read
55

Apple’s Find My Network Can be Abused to Exfiltrate Data From Nearby Devices

May 18, 2021
0

Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My Bluetooth” broadcasts to nearby Apple devices. “It’s possible to upload arbitrary data from non-internet-connected devices by sending Find My [Bluetooth Low Energy]

Continue Reading