Online Security
1 min read
41

Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute Malware

April 29, 2021
0

Threat actors are increasingly adopting Excel 4.0 documents as an initial stage vector to distribute malware such as ZLoader and Quakbot, according to new research. The findings come from an analysis of 160,000 Excel 4.0 documents between November 2020 and March 2021, out of which more than 90% were classified

Continue Reading
Online Security
2 min read
45

Hackers Threaten to Leak D.C. Police Informants’ Info If Ransom Is Not Paid

April 28, 2021
0

The Metropolitan Police Department (MPD) of the District of Columbia has become the latest high-profile government agency to fall victim to a ransomware attack. The Babuk Locker gang claimed in a post on the dark web that they had compromised the DC Police’s networks and stolen 250 GB of unencrypted

Continue Reading
Online Security
2 min read
41

Minnesota University Apologizes for Contributing Malicious Code to the Linux Project

April 27, 2021
0

Researchers from the University of Minnesota apologized to the maintainers of Linux Kernel Project on Saturday for intentionally including vulnerabilities in the project’s code, which led to the school being banned from contributing to the open-source project in the future. “While our goal was to improve the security of Linux,

Continue Reading
Online Security
1 min read
43

Critical RCE Bug Found in Homebrew Package Manager for macOS and Linux

April 26, 2021
0

A recently identified security vulnerability in the official Homebrew Cask repository could have been exploited by an attacker to execute arbitrary code on users’ machines that have Homebrew installed. The issue, which was reported to the maintainers on April 18 by a Japanese security researcher named RyotaK, stemmed from the

Continue Reading
Online Security
1 min read
39

Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCs

April 25, 2021
0

Click Studios, the Australian software company behind the Passwordstate password management application, has notified customers to reset their passwords following a software supply chain attack. The Adelaide-based firm said a bad actor used sophisticated techniques to compromise the software’s update mechanism and used it to drop malware on user computers.

Continue Reading
Online Security
1 min read
48

Prometei Botnet Exploiting Unpatched Microsoft Exchange Servers

April 24, 2021
0

Attackers are exploiting the ProxyLogon Microsoft Exchange Server flaws to co-opt vulnerable machines to a cryptocurrency botnet named Prometei, according to new research. “Prometei exploits the recently disclosed Microsoft Exchange vulnerabilities associated with the HAFNIUM attacks to penetrate the network for malware deployment, credential harvesting and more,” Boston-based cybersecurity firm

Continue Reading
Online Security
1 min read
34

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

April 23, 2021
0

The sprawling SolarWinds cyberattack which came to light last December was known for its sophistication in the breadth of tactics used to infiltrate and persist in the target infrastructure, so much so that Microsoft went on to call the threat actor behind the campaign “skillful and methodic operators who follow

Continue Reading
Online Security
2 min read
51

Improve Your Cyber Security Posture by Combining State of the Art Security Tools

April 22, 2021
0

Today there are plenty of cybersecurity tools on the market. It is now more important than ever that the tools you decide to use work well together. If they don’t, you will not get the complete picture, and you won’t be able to analyze the entire system from a holistic

Continue Reading
Online Security
1 min read
45

[eBook] Why Autonomous XDR Is Going to Replace NGAV/EDR

April 21, 2021
0

For most organizations today, endpoint protection is the primary security concern. This is not unreasonable – endpoints tend to be the weakest points in an environment – but it also misses the forest for the trees. As threat surfaces expand, security professionals are harder pressed to detect threats that target

Continue Reading
Online Security
1 min read
50

Malware That Spreads Via Xcode Projects Now Targeting Apple’s M1-based Macs

April 20, 2021
0

A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple’s new M1 chips and expand its features to steal confidential information from cryptocurrency apps. XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon

Continue Reading
Online Security
1 min read
49

What are the different roles within cybersecurity?

April 19, 2021
0

People talk about the cybersecurity job market like it’s a monolith, but there are a number of different roles within cybersecurity, depending not only on your skill level and experience but on what you like to do. In fact, Cybercrime Magazine came up with a list of 50 cybersecurity job

Continue Reading
Online Security
1 min read
47

SysAdmin of Billion-Dollar Hacking Group Gets 10-Year Sentence

April 18, 2021
0

A high-level manager and systems administrator associated with the FIN7 threat actor has been sentenced to 10 years in prison, the U.S. Department of Justice announced Friday. Fedir Hladyr, a 35-year-old Ukrainian national, is said to have played a crucial role in a criminal scheme that compromised tens of millions

Continue Reading
Online Security
1 min read
40

Severe Bugs Reported in EtherNet/IP Stack for Industrial Systems

April 17, 2021
0

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an advisory warning of multiple vulnerabilities in the OpENer EtherNet/IP stack that could expose industrial systems to denial-of-service (DoS) attacks, data leaks, and remote code execution. All OpENer commits and versions prior to February 10, 2021, are affected, although

Continue Reading
Online Security
1 min read
39

1-Click Hack Found in Popular Desktop Apps — Check If You’re Using Them

April 16, 2021
0

Multiple one-click vulnerabilities have been discovered across a variety of popular software applications, allowing an attacker to potentially execute arbitrary code on target systems. The issues were discovered by Positive Security researchers Fabian Bräunlein and Lukas Euler and affect apps like Telegram, Nextcloud, VLC, LibreOffice, OpenOffice, Bitcoin/Dogecoin Wallets, Wireshark, and

Continue Reading
Online Security
1 min read
42

New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks

April 15, 2021
0

Academics from Vrije University in Amsterdam and ETH Zurich have published a new research paper describing yet another variation of the Rowhammer attack. Dubbed SMASH (Synchronized MAny-Sided Hammering), the technique can be used to successfully trigger the attack from JavaScript on modern DDR4 RAM cards, notwithstanding extensive mitigations that have

Continue Reading
Online Security
1 min read
41

New NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT Devices

April 13, 2021
0

Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices that could be exploited by an attacker to take control of a vulnerable system. Dubbed “NAME:WRECK” by Forescout and JSOF, the flaws are the latest in series of studies undertaken as

Continue Reading
Online Security
1 min read
42

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data

April 12, 2021
0

Online trading and discount brokerage platform Upstox has become the latest Indian company to suffer a security breach of its systems, resulting in the exposure of sensitive information of approximately 2.5 million users on the dark web. The leaked information includes names, email addresses, dates of birth, bank account information,

Continue Reading
Online Security
1 min read
37

[WHITEPAPER] How to Achieve CMMC Security Compliance for Your Business

April 11, 2021
0

For organizations that deal with the defense infrastructure – cybersecurity is more than just a buzzword. Recently the US Department of Defense (DoD) created a new certification process – the Cybersecurity Maturity Model Certificate (CMMC) – to ensure that all its vendors and contractors follow established best cybersecurity practices. For

Continue Reading