Online Security
1 min read
41

Facebook Messenger Bug Lets Hackers Listen to You Before You Pick Up the Call

November 20, 2020
0

Facebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by Natalie Silvanovich of Google’s Project

Continue Reading
Online Security
1 min read
41

Researchers Warn of Critical Flaw Affecting Industrial Automation Systems

November 19, 2020
0

A critical vulnerability uncovered in Real-Time Automation’s (RTA) 499ES EtherNet/IP (ENIP) stack could open up the industrial control systems to remote attacks by adversaries. RTA’s ENIP stack is one of the widely used industrial automation devices and is billed as the “standard for factory floor I/O applications in North America.”

Continue Reading
Online Security
2 min read
50

Apple Lets Some of its Big Sur macOS Apps Bypass Firewall and VPNs

November 18, 2020
0

Apple is facing the heat for a new feature in macOS Big Sur that allows many of its own apps to bypass firewalls and VPNs, thereby potentially allowing malware to exploit the same shortcoming to access sensitive data stored on users’ systems and transmit them to remote servers. The issue

Continue Reading
Online Security
1 min read
45

Chinese APT Hackers Target Southeast Asian Government Institutions

November 17, 2020
0

Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe was carried out by a sophisticated Chinese APT group at least since 2018. “The attack has a complex and complete arsenal of droppers, backdoors and other tools involving

Continue Reading
Online Security
1 min read
38

Trojanized Security Software Hits South Korea Users in Supply-Chain Attack

November 16, 2020
0

Cybersecurity researchers took the wraps off a novel supply chain attack in South Korea that abuses legitimate security software and stolen digital certificates to distribute remote administration tools (RATs) on target systems. Attributing the operation to the Lazarus Group, also known as Hidden Cobra, Slovak internet security company ESET said

Continue Reading
Online Security
1 min read
46

New ModPipe Point of Sale (POS) Malware Targeting Restaurants, Hotels

November 15, 2020
0

Cybersecurity researchers today disclosed a new kind of modular backdoor that targets point-of-sale (POS) restaurant management software from Oracle in an attempt to pilfer sensitive payment information stored in the devices. The backdoor — dubbed “ModPipe” — impacts Oracle MICROS Restaurant Enterprise Series (RES) 3700 POS systems, a widely used

Continue Reading
Online Security
1 min read
47

SAD DNS — New Flaws Re-Enable DNS Cache Poisoning Attacks

November 14, 2020
0

A group of academics from the University of California and Tsinghua University has uncovered a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks. Dubbed “SAD DNS attack” (short for Side-channel AttackeD DNS), the technique makes it possible for a malicious actor to

Continue Reading
Online Security
1 min read
39

Reducing Complexity by Increasing Consolidation for SMEs

November 13, 2020
0

Complexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set of cyber threats is leading to runaway costs, staff inefficiencies, and suboptimal threat response. Small to medium-sized enterprises (SMEs) with limited budgets and staff are significantly

Continue Reading
Online Security
1 min read
41

APT ‘Hackers For Hire’ Target Financial, Entertainment Firms

November 12, 2020
0

A hackers-for-hire operation has been discovered using a strain of previously undocumented malware to target South Asian financial institutions and global entertainment companies. Dubbed “CostaRicto” by Blackberry researchers, the campaign appears to be the handiwork of APT mercenaries who possess bespoke malware tooling and complex VPN proxy and SSH tunneling

Continue Reading
Online Security
1 min read
39

Over 2800 e-Shops Running Outdated Magento Software Hit by Credit Card Hackers

November 11, 2020
0

A wave of cyberattacks against retailers running the Magento 1.x e-commerce platform earlier this September has been attributed to one single group, according to the latest research. “This group has carried out a large number of diverse Magecart attacks that often compromise large numbers of websites at once through supply

Continue Reading
Online Security
1 min read
43

Watch Out! New Android Banking Trojan Steals From 112 Financial Apps

November 10, 2020
0

Four months after security researchers uncovered a “Tetrade” of four Brazilian banking Trojans targeting financial institutions in Brazil, Latin America, and Europe, new findings show that the criminals behind the operation have expanded their tactics to infect mobile devices with spyware. According to Kaspersky’s Global Research and Analysis Team (GReAT),

Continue Reading
Online Security
1 min read
42

Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup Competition

November 9, 2020
0

Multiple software products from Adobe, Apple, Google, Microsoft, Mozilla, and Samsung were successfully pwned with previously unseen exploits in Tianfu Cup 2020, the third edition of the international cybersecurity contest held in the city of Chengdu, China. “Many mature and hard targets have been pwned on this year’s contest,” the

Continue Reading
Online Security
1 min read
47

No Longer Only A Fortune 2000 Solution

November 8, 2020
0

A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable – intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen

Continue Reading
Online Security
1 min read
50

North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks

November 7, 2020
0

A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims’ machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and

Continue Reading
Online Security
1 min read
45

Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered

November 6, 2020
0

Apple on Thursday released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild. Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary

Continue Reading
Online Security
1 min read
47

Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies

November 5, 2020
0

Cybersecurity researchers today took the wraps off an on-going cyber fraud operation led by hackers in Gaza, West Bank, and Egypt to compromise VoIP servers of more than 1,200 organizations across 60 countries over the past 12 months. According to findings published by Check Point Research, the threat actors —

Continue Reading
Online Security
2 min read
46

New Chrome Zero-Day Under Active Attacks – Update Your Browser

November 4, 2020
0

Google has patched a second actively exploited zero-day flaw in the Chrome browser in two weeks, along with addressing nine other security vulnerabilities in its latest update. The company released 86.0.4240.183 for Windows, Mac, and Linux, which it said will be rolling out over the coming days/weeks to all users.

Continue Reading
Online Security
1 min read
50

New Kimsuky Module Makes North Korean Spyware More Powerful

November 3, 2020
0

A week after the US government issued an advisory about a “global intelligence gathering mission” operated by North Korean state-sponsored hackers, new findings have emerged about the threat group’s spyware capabilities. The APT — dubbed “Kimsuky” (aka Black Banshee or Thallium) and believed to be active as early as 2012

Continue Reading