Online Security
1 min read
44

Hackers-For-Hire Group Develops New ‘PowerPepper’ In-Memory Malware

December 6, 2020
0

Cybersecurity researchers on Thursday disclosed details of a previously undiscovered in-memory Windows backdoor developed by a hacker-for-hire operation that can execute remotely malicious code and steal sensitive information from its targets in Asia, Europe, and the US. Dubbed “PowerPepper” by Kaspersky researchers, the malware has been attributed to the DeathStalker

Continue Reading
Online Security
1 min read
48

How Organizations Can Prevent Users from Using Breached Passwords

December 5, 2020
0

There is no question that attackers are going after your sensitive account data. Passwords have long been a target of those looking to compromise your environment. Why would an attacker take the long, complicated way if they have the keys to the front door? No matter how extensive your security

Continue Reading
Online Security
1 min read
41

Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution

December 4, 2020
0

A global spear-phishing campaign has been targeting organizations associated with the distribution of COVID-19 vaccines since September 2020, according to new research. Attributing the operation to a nation-state actor, IBM Security X-Force researchers said the attacks took aim at the vaccine cold chain, companies responsible for storing and delivering the

Continue Reading
Online Security
1 min read
60

TrickBot Malware Gets UEFI/BIOS Bootkit Feature to Remain Undetected

December 3, 2020
0

TrickBot, one of the most notorious and adaptable malware botnets in the world, is expanding its toolset to set its sights on firmware vulnerabilities to potentially deploy bootkits and take complete control of an infected system. The new functionality, dubbed “TrickBoot” by Advanced Intelligence (AdvIntel) and Eclypsium, makes use of

Continue Reading
Online Security
1 min read
48

Google Hacker Details Zero-Click ‘Wormable’ Wi-Fi Exploit to Hack iPhones

December 2, 2020
0

Google Project Zero white-hat hacker Ian Beer on Tuesday disclosed details of a now-patched critical “wormable” iOS bug that could have made it possible for a remote attacker to gain complete control of any device in the vicinity over Wi-Fi. The exploit makes it possible to “view all the photos,

Continue Reading
Online Security
1 min read
39

Nation-State Hackers Caught Hiding Espionage Activities Behind Crypto Miners

December 1, 2020
0

A nation-state actor known for its cyber espionage campaigns since 2012 is now using coin miner techniques to stay under the radar and establish persistence on victim systems, according to new research. Attributing the shift to a threat actor tracked as Bismuth, Microsoft’s Microsoft 365 Defender Threat Intelligence Team said

Continue Reading
Online Security
1 min read
50

Quick Guide — How to Troubleshoot Active Directory Account Lockouts

November 30, 2020
0

Active Directory account lockouts can be hugely problematic for organizations. There have been documented instances of attackers leveraging the account lockout feature in a type of denial of service attack. By intentionally entering numerous bad passwords, attackers can theoretically lock all of the users out of their accounts. But what

Continue Reading
Online Security
1 min read
39

Interpol Arrests 3 Nigerian BEC Scammers For Targeting Over 500,000 Entities

November 29, 2020
0

Three Nigerian citizens suspected of being members of an organized cybercrime group behind distributing malware, carrying out phishing campaigns, and extensive Business Email Compromise (BEC) scams have been arrested in the city of Lagos, Interpol reported yesterday. The investigation, dubbed “Operation Falcon,” was jointly undertaken by the international police organization

Continue Reading
Online Security
2 min read
41

Become a White Hat Hacker — Get 10 Top-Rated Courses at 97% OFF

November 28, 2020
0

Many of us here would love to turn hacking into a full-time career. To make that dream come true, you need to master your subject and earn some key certifications. To speed up this process, you might want to take a little guidance from the experts. Featuring 98 hours of

Continue Reading
Online Security
5 min read
46

Kaspersky urges Malaysian parents to keep their kids safer online

November 28, 2020
0

Kaspersky discusses with industry experts on how to raise kids, and suggests ways to secure them against cybercriminals.

Continue Reading
Online Security
1 min read
50

Digitally Signed Bandook Malware Once Again Targets Multiple Sectors

November 27, 2020
0

A cyberespionage group with suspected ties to the Kazakh and Lebanese governments has unleashed a new wave of attacks against a multitude of industries with a retooled version of a 13-year-old backdoor Trojan. Check Point Research called out hackers affiliated with a group named Dark Caracal in a new report

Continue Reading
Online Security
1 min read
48

China’s Baidu Android Apps Caught Collecting Sensitive User Data

November 26, 2020
0

Two popular Android apps from Chinese tech giant Baidu were temporarily unavailable on the Google Play Store in October after they were caught collecting sensitive user details. The two apps in question—Baidu Maps and Baidu Search Box—were found to collect device identifiers, such as the International Mobile Subscriber Identity (IMSI)

Continue Reading
Online Security
1 min read
38

2-Factor Authentication Bypass Flaw Reported in cPanel and WHM Software

November 25, 2020
0

cPanel, a provider of popular administrative tools to manage web hosting, has patched a security vulnerability that could have allowed remote attackers with access to valid credentials to bypass two-factor authentication (2FA) protection on an account. The issue, tracked as “SEC-575” and discovered by researchers from Digital Defense, has been

Continue Reading
Online Security
1 min read
38

Critical Unpatched VMware Flaw Affects Multiple Corporates Products

November 24, 2020
0

VMware has released temporary workarounds to address a critical vulnerability in its products that could be exploited by an attacker to take control of an affected system. “A malicious actor with network access to the administrative configurator on port 8443 and a valid password for the configurator admin account can

Continue Reading
Online Security
1 min read
38

Why Replace Traditional Web Application Firewall (WAF) With New Age WAF?

November 23, 2020
0

At present, web applications have become the top targets for attackers because of potential monetization opportunities. Security breaches on the web application can cost millions. Strikingly, DNS (Domain Name System) related outage and Distributed denial of service (DDoS) lead a negative impact on businesses. Among the wide range of countermeasures,

Continue Reading
Online Security
2 min read
37

From Banking Trojan to Malware Distributor

November 22, 2020
0

Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other kinds of computer viruses. Being constantly under development, Emotet updates

Continue Reading
Online Security
1 min read
34

Unpatched Bug in GO SMS Pro App Exposes Millions of Media Messages

November 21, 2020
0

GO SMS Pro, a popular messaging app for Android with over 100 million installs, has been found to have an unpatched security flaw that publicly exposes media transferred between users, including private voice messages, photos, and videos. “This means any sensitive media shared between users of this messenger app is

Continue Reading
Online Security
6 min read
43

Sophos 2021 Threat Report – Cyberattack Trends Expected to Shape IT Security In 2021

November 21, 2020
0

Sophos 2021 Threat Report, which flags how ransomware and fast-changing attacker behaviors, from advanced to entry level.

Continue Reading