Online Security
1 min read
38

LodaRAT Windows Malware Now Also Targets Android Devices

February 15, 2021
0

A previously known Windows remote access Trojan (RAT) with credential-stealing capabilities has now expanded its scope to set its sights on users of Android devices to further the attacker’s espionage motives. “The developers of LodaRAT have added Android as a targeted platform,” Cisco Talos researchers said in a Tuesday analysis.

Continue Reading
Online Security
1 min read
45

Iranian Hackers Utilize ScreenConnect to Spy On UAE, Kuwait Government Agencies

February 14, 2021
0

UAE and Kuwait government agencies are targets of a new cyberespionage campaign potentially carried out by Iranian threat actors, according to new research. Attributing the operation to be the work of Static Kitten (aka MERCURY or MuddyWater), Anomali said the “objective of this activity is to install a remote management

Continue Reading
Online Security
1 min read
38

Yandex Employee Caught Selling Access to Users’ Email Inboxes

February 13, 2021
0

Russian Dutch-domiciled search engine, ride-hailing and email service provider Yandex on Friday disclosed a data breach that compromised 4,887 email accounts of its users. The company blamed the incident on an unnamed employee who had been providing unauthorized access to the users’ mailboxes for personal gain. “The employee was one

Continue Reading
Online Security
1 min read
56

Secret Chat in Telegram Left Self-Destructing Media Files On Devices

February 12, 2021
0

Popular messaging app Telegram fixed a privacy-defeating bug in its macOS app that made it possible to access self-destructing audio and video messages long after they disappeared from secret chats. The vulnerability was discovered by security researcher Dhiraj Mishra in version 7.3 of the app, who disclosed his findings to

Continue Reading
Online Security
1 min read
39

Microsoft Issues Patches for In-the-Wild 0-day and 55 Others Windows Bugs

February 11, 2021
0

Microsoft on Tuesday issued fixes for 56 flaws, including a critical vulnerability that’s known to be actively exploited in the wild. In all, 11 are listed as Critical, 43 are listed as Important, and two are listed as Moderate in severity — six of which are previously disclosed vulnerabilities. The

Continue Reading
Online Security
1 min read
34

Apple Patches 10-Year-Old macOS SUDO Root Privilege Escalation Bug

February 10, 2021
0

Apple has rolled out a fix for a critical sudo vulnerability in macOS Big Sur, Catalina, and Mojave that could allow unauthenticated local users to gain root-level privileges on the system. “A local attacker may be able to elevate their privileges,” Apple said in a security advisory. “This issue was

Continue Reading
Online Security
1 min read
69

Top 5 Bug Bounty Platforms to Watch in 2021

February 9, 2021
0

While Gartner does not have a dedicated Magic Quadrant for Bug Bounties or Crowd Security Testing yet, Gartner Peer Insights already lists 24 vendors in the “Application Crowdtesting Services” category. We have compiled the top 5 most promising bug bounty platforms for those of you who are looking to enhance

Continue Reading
Online Security
1 min read
37

Here’s How Iran Spies on Dissidents with the Help of Hackers

February 8, 2021
0

Twin cyber operations conducted by state-sponsored Iranian threat actors demonstrate their continued focus on compiling detailed dossiers on Iranian citizens that could threaten the stability of the Islamic Republic, including dissidents, opposition forces, and ISIS supporters, and Kurdish natives. Tracing the extensive espionage operations to two advanced Iranian cyber-groups Domestic

Continue Reading
Online Security
1 min read
48

Cybercriminals Now Using Plex Media Servers to Amplify DDoS Attacks

February 7, 2021
0

A new distributed denial-of-service attack (DDoS) vector has ensnared Plex Media Server systems to amplify malicious traffic against targets to take them offline. “Plex’s startup processes unintentionally expose a Plex UPnP-enabled service registration responder to the general Internet, where it can be abused to generate reflection/amplification DDoS attacks,” Netscout researchers

Continue Reading
Online Security
1 min read
36

WARNING — Hugely Popular ‘The Great Suspender’ Chrome Extension Contains Malware

February 6, 2021
0

Google on Thursday removed The Great Suspender, a popular Chrome extension used by millions of users, from its Chrome Web Store for containing malware. It also took the unusual step of deactivating it from users’ computers. “This extension contains malware,” read a terse notification from Google, but it has since

Continue Reading
Online Security
1 min read
48

Critical Flaws Reported in Cisco VPN Routers for Businesses—Patch ASAP

February 5, 2021
0

Cisco has rolled out fixes for multiple critical vulnerabilities in the web-based management interface of Small Business routers that could potentially allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. The flaws — tracked from CVE-2021-1289 through CVE-2021-1295 (CVSS score 9.8) —

Continue Reading
Online Security
1 min read
48

How to Audit Password Changes in Active Directory

February 4, 2021
0

Today’s admins certainly have plenty on their plates, and boosting ecosystem security remains a top priority. On-premises, and especially remote, accounts are gateways for accessing critical information. Password management makes this possible. After all, authentication should ensure that a user is whom they claim to be. This initial layer of

Continue Reading
Online Security
1 min read
40

Over a Dozen Chrome Extensions Caught Hijacking Google Search Results for Millions

February 3, 2021
0

New details have emerged about a vast network of rogue extensions for Chrome and Edge browsers that were found to hijack clicks to links in search results pages to arbitrary URLs, including phishing sites and ads. Collectively called “CacheFlow” by Avast, the 28 extensions in question — including Video Downloader

Continue Reading
Online Security
1 min read
40

Agent Tesla Malware Spotted Using New Delivery & Evasion Techniques

February 2, 2021
0

Security researchers on Tuesday uncovered new delivery and evasion techniques adopted by Agent Tesla remote access trojan (RAT) to get around defense barriers and monitor its victims. Typically spread through social engineering lures, the Windows spyware not only now targets Microsoft’s Antimalware Scan Interface (AMSI) in an attempt to defeat

Continue Reading
Online Security
1 min read
189

A New Software Supply‑Chain Attack Targeted Millions With Spyware

February 1, 2021
0

Cybersecurity researchers today disclosed a new supply chain attack compromising the update mechanism of NoxPlayer, a free Android emulator for PCs and Macs. Dubbed “Operation NightScout” by Slovak cybersecurity firm ESET, the highly-targeted surveillance campaign involved distributing three different malware families via tailored malicious updates to selected victims based in

Continue Reading
Online Security
1 min read
37

Hezbollah Hacker Group Targeted Telecoms, Hosting, ISPs Worldwide

January 31, 2021
0

A “persistent attacker group” with alleged ties to Hezbollah has retooled its malware arsenal with a new version of a remote access Trojan (RAT) to break into companies worldwide and extract valuable information. In a new report published by the ClearSky research team on Thursday, the Israeli cybersecurity firm said

Continue Reading
Online Security
1 min read
43

Google uncovers new iOS security feature Apple quietly added after zero-day attacks

January 30, 2021
0

Google Project Zero on Thursday disclosed details of a new security mechanism that Apple quietly added to iOS 14 as a countermeasure to prevent attacks that were recently found to leverage zero-days in its messaging app. Dubbed “BlastDoor,” the improved sandbox system for iMessage data was disclosed by Samuel Groß,

Continue Reading
Online Security
1 min read
39

New CISOs Survey Reveals How Small Cybersecurity Teams Can Confront 2021

January 29, 2021
0

The pressure on small to medium-sized enterprises to protect their organizations against cyberthreats is astronomical. These businesses face the same threats as the largest enterprises, experience the same (relative) damages and consequences when breaches occur as the largest enterprises but are forced to protect their organizations with a fraction of

Continue Reading