Online Security
1 min read
40

This New Malware Family Using CLFS Log Files to Avoid Detection

September 3, 2021
0

Cybersecurity researchers have disclosed details about a new malware family that relies on the Common Log File System (CLFS) to hide a second-stage payload in registry transaction files in an attempt to evade detection mechanisms. FireEye’s Mandiant Advanced Practices team, which made the discovery, dubbed the malware PRIVATELOG, and its

Continue Reading
Online Security
1 min read
36

New BrakTooth Flaws Leave Millions of Bluetooth-enabled Devices Vulnerable

September 2, 2021
0

A set of new security vulnerabilities has been disclosed in commercial Bluetooth stacks that could enable an adversary to execute arbitrary code and, worse, crash the devices via denial-of-service (DoS) attacks. Collectively dubbed “BrakTooth” (referring to the Norwegian word “Brak” which translates to “crash”), the 16 security weaknesses span across

Continue Reading
Online Security
2 min read
34

[LIVE WEBINAR] How Lean Security Teams Can Improve Their Time to Response

September 1, 2021
0

Cybersecurity could be described as a marathon for security teams that spend most of their time building sustained defenses that prevent threats day after day. However, they must be ready to hit a sprint whenever an attack succeeds since attack duration, and the resulting damages are directly correlated. Reacting to

Continue Reading
Online Security
1 min read
42

Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms

August 31, 2021
0

New vulnerabilities have been discovered in Fortress S03 Wi-Fi Home Security System that could be potentially abused by a malicious party to gain unauthorized access with an aim to alter system behavior, including disarming the devices without the victim’s knowledge. The two unpatched issues, tracked under the identifiers CVE-2021-39276 (CVSS

Continue Reading
Online Security
1 min read
47

How Does MTA-STS Improve Your Email Security?

August 30, 2021
0

Simple Mail Transfer Protocol or SMTP has easily exploitable security loopholes. Email routing protocols were designed in a time when cryptographic technology was at a nascent stage (e.g., the de-facto protocol for email transfer, SMTP, is nearly 40 years old now), and therefore security was not an important consideration. As

Continue Reading
Online Security
1 min read
45

Get Lifetime Access to 24 Professional Cybersecurity Certification Prep Courses

August 29, 2021
0

Not all heroes wear capes. Cybersecurity professionals are digital warriors who use their knowledge and skill to battle malicious hackers. Sounds like an exciting career, right? If the comic-book comparisons aren’t working for you, perhaps some figures will. According to ZipRecruiter, the average salary of a cybersecurity professional is just

Continue Reading
Online Security
1 min read
41

Kaseya Issues Patches for Two New 0-Day Flaws Affecting Unitrends Servers

August 28, 2021
0

U.S. technology firm Kaseya has released security patches to address two zero-day vulnerabilities affecting its Unitrends enterprise backup and continuity solution that could result in privilege escalation and authenticated remote code execution. The two weaknesses are part of a trio of vulnerabilities discovered and reported by researchers at the Dutch

Continue Reading
Online Security
1 min read
35

Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years

August 27, 2021
0

Google and Microsoft said they are pledging to invest a total of $30 billion in cybersecurity advancements over the next five years, as the U.S. government partners with private sector companies to address threats facing the country in the wake of a string of sophisticated malicious cyber activity targeting critical

Continue Reading
Online Security
1 min read
37

The Increased Liability of Local In-home Propagation

August 26, 2021
0

Today I discuss an attack vector conducive to cross-organizational spread, in-home local propagation. Though often overlooked, this vector is especially relevant today, as many corporate employees remain working from home. In this post, I contrast in-home local propagation with traditional vectors through which a threat (ransomware in particular) spreads throughout

Continue Reading
Online Security
1 min read
33

Preventing your Cloud ‘Secrets’ from Public Exposure: An IDE plugin solution

August 25, 2021
0

I’m sure you would agree that, in today’s digital world, the majority of applications we work on require some type of credentials – to connect to a database with a username/password, to access computer programs via authorized tokens, or API keys to invoke services for authentication. Credentials, or sometimes just

Continue Reading
Online Security
1 min read
40

Modified Version of WhatsApp for Android Spotted Installing Triada Trojan

August 24, 2021
0

A modified version of the WhatsApp messaging app for Android has been trojanized to serve malicious payloads, display full-screen ads, and sign up device owners for unwanted premium subscriptions without their knowledge. “The Trojan Triada snuck into one of these modified versions of the messenger called FMWhatsApp 16.80.0 together with

Continue Reading
Online Security
1 min read
48

Mozi IoT Botnet Now Also Targets Netgear, Huawei, and ZTE Network Gateways

August 23, 2021
0

Mozi, a peer-to-peer (P2P) botnet known to target IoT devices, has gained new capabilities that allow it to achieve persistence on network gateways manufactured by Netgear, Huawei, and ZTE, according to latest findings. “Network gateways are a particularly juicy target for adversaries because they are ideal as initial access points

Continue Reading
Online Security
1 min read
50

Microsoft Exchange Under Attack With ProxyShell Flaws; Over 1900 Servers Hacked!

August 22, 2021
0

The U.S. Cybersecurity and Infrastructure Security Agency is warning of active exploitation attempts that leverage the latest line of “ProxyShell” Microsoft Exchange vulnerabilities that were patched earlier this May, including deploying LockFile ransomware on compromised systems. Tracked as CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207, the vulnerabilities enable adversaries to bypass ACL controls,

Continue Reading
Online Security
1 min read
46

Cloudflare mitigated one of the largest DDoS attack involving 17.2 million rps

August 21, 2021
0

Web infrastructure and website security company Cloudflare on Thursday disclosed that it mitigated the largest ever volumetric distributed denial of service (DDoS) attack recorded to date. The attack, launched via a Mirai botnet, is said to have targeted an unnamed customer in the financial industry last month. “Within seconds, the

Continue Reading
Online Security
1 min read
41

Cybercrime Group Asking Insiders for Help in Planting Ransomware

August 20, 2021
0

A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies’ networks as part of an insider threat scheme. “The sender tells the employee that if they’re able to deploy ransomware on a company

Continue Reading
Online Security
1 min read
35

Researchers Find New Evidence Linking Diavol Ransomware to TrickBot Gang

August 19, 2021
0

Cybersecurity researchers have disclosed details about an early development version of a nascent ransomware strain called Diavol that has been linked to threat actors behind the infamous TrickBot syndicate. The latest findings from IBM X-Force show that the ransomware sample shares similarities to other malware that has been attributed to

Continue Reading
Online Security
1 min read
34

Iranian Hackers Target Several Israeli Organizations With Supply-Chain Attacks

August 18, 2021
0

IT and communication companies in Israel were at the center of a supply chain attack campaign spearheaded by an Iranian threat actor that involved impersonating the firms and their HR personnel to target victims with fake job offers in an attempt to penetrate their computers and gain access to the

Continue Reading
Online Security
1 min read
27

Malicious Ads Target Cryptocurrency Users With Cinobi Banking Trojan

August 17, 2021
0

A new social engineering-based malvertising campaign targeting Japan has been found to deliver a malicious application that deploys a banking trojan on compromised Windows machines to steal credentials associated with cryptocurrency accounts. The application masquerades as an animated porn game, a reward points application, or a video streaming application, Trend

Continue Reading