Online Security
1 min read
39

Magecart Hackers Hide Stolen Credit Card Data Into Images for Evasive Exfiltration

July 10, 2021
0

Cybercrime actors part of the Magecart group have latched on to a new technique of obfuscating the malware code within comment blocks and encoding stolen credit card data into images and other files hosted on the server, once again demonstrating how the attackers are continuously improving their infection chains to

Continue Reading
Online Security
1 min read
35

How to Mitigate Microsoft Print Spooler Vulnerability – PrintNightmare

July 9, 2021
0

This week, PrintNightmare – Microsoft’s Print Spooler vulnerability (CVE-2021-34527) was upgraded from a ‘Low’ criticality to a ‘Critical’ criticality. This is due to a Proof of Concept published on GitHub, which attackers could potentially leverage for gaining access to Domain Controllers. As we reported earlier, Microsoft already released a patch

Continue Reading
Online Security
1 min read
38

WildPressure APT Emerges With New Malware Targeting Windows and macOS

July 8, 2021
0

A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded malware toolset to strike both Windows and macOS operating systems, symbolizing an expansion in both its targets and its strategy around distributing threats. Russian cybersecurity firm attributed the

Continue Reading
Online Security
1 min read
33

Kaseya Rules Out Supply-Chain Attack; Says VSA 0-Day Hit Its Customers Directly

July 7, 2021
0

U.S. technology firm Kaseya, which is firefighting the largest ever supply-chain ransomware strike on its VSA on-premises product, ruled out the possibility that its codebase was unauthorizedly tampered with to distribute malware. While initial reports raised speculations that the ransomware gang might have gained access to Kaseya’s backend infrastructure and

Continue Reading
Online Security
1 min read
37

A Practical Guide for Startups

July 6, 2021
0

A common misconception among startup founders is that cybercriminals won’t waste time on them, because they’re not big or well known enough yet. But just because you are small doesn’t mean you’re not in the firing line. The size of a startup does not exempt it from cyber-attacks – that’s

Continue Reading
Online Security
1 min read
37

Kaseya Supply-Chain Attack Hits Nearly 40 Service Providers With REvil Ransomware

July 5, 2021
0

Threat actors behind the notorious REvil cybercrime operation appear to have pushed ransomware via an update for Kaseya’s IT management software, hitting around 40 customers worldwide, in what’s an instance of a widespread supply-chain ransomware attack. “Beginning around mid-day (EST/US) on Friday, July 2, 2021, Kaseya’s Incident Response team learned

Continue Reading
Online Security
1 min read
42

Android Apps with 5.8 million Installs Caught Stealing Users’ Facebook Passwords

July 4, 2021
0

Google intervened to remove nine Android apps downloaded more than 5.8 million times from the company’s Play Store after the apps were caught furtively stealing users’ Facebook login credentials. “The applications were fully functional, which was supposed to weaken the vigilance of potential victims. With that, to access all of

Continue Reading
Online Security
1 min read
40

New Mirai-Inspired Botnet Could Be Using Your KGUARD DVRs in Cyber Attacks

July 3, 2021
0

Cybersecurity researchers on Thursday revealed details about a new Mirai-inspired botnet called “mirai_ptea” that leverages an undisclosed vulnerability in digital video recorders (DVR) provided by KGUARD to propagate and carry out distributed denial-of-service (DDoS) attacks. Chinese security firm Netlab 360 pinned the first probe against the flaw on March 23,

Continue Reading
Online Security
1 min read
41

IndigoZebra APT Hacking Campaign Targets the Afghan Government

July 2, 2021
0

Cybersecurity researchers are warning of ongoing attacks coordinated by a suspected Chinese-speaking threat actor targeting the Afghanistan government as part of an espionage campaign that may have had its provenance as far back as 2014. Israeli cybersecurity firm Check Point Research attributed the intrusions to a hacking group tracked under

Continue Reading
Online Security
1 min read
37

Researchers Leak PoC Exploit for a Critical Windows RCE Vulnerability

July 1, 2021
0

A proof-of-concept (PoC) exploit related to a remote code execution vulnerability affecting Windows Print Spooler and patched by Microsoft earlier this month was briefly published online before being taken down. Identified as CVE-2021-1675, the security issue could grant remote attackers full control of vulnerable systems. Print Spooler manages the printing

Continue Reading
Online Security
1 min read
43

Unpatched Virtual Machine Takeover Bug Affects Google Compute Engine

June 30, 2021
0

An unpatched security vulnerability affecting Google’s Compute Engine platform could be abused by an attacker to take over virtual machines over the network. “This is done by impersonating the metadata server from the targeted virtual machine’s point of view,” security researcher Imre Rad said in an analysis published Friday. “By

Continue Reading
Online Security
1 min read
47

Microsoft Edge Bug Could’ve Let Hackers Steal Your Secrets for Any Site

June 29, 2021
0

Microsoft last week rolled out updates for the Edge browser with fixes for two security issues, one of which concerns a security bypass vulnerability that could be exploited to inject and execute arbitrary code in the context of any website. Tracked as CVE-2021-34506 (CVSS score: 5.4), the weakness stems from

Continue Reading
Online Security
1 min read
45

Crackonosh virus mined $2 million of Monero from 222,000 hacked computers

June 28, 2021
0

A previously undocumented Windows malware has infected over 222,000 systems worldwide since at least June 2018, yielding its developer no less than 9,000 Moneros ($2 million) in illegal profits. Dubbed “Crackonosh,” the malware is distributed via illegal, cracked copies of popular software, only to disable antivirus programs installed in the

Continue Reading
Online Security
1 min read
44

Watch Out! Zyxel Firewalls and VPNs Under Active Cyberattack

June 27, 2021
0

Taiwanese networking equipment company Zyxel is warning customers of an ongoing attack targeting a “small subset” of its security products such as firewall and VPN servers. Attributing the attacks to a “sophisticated threat actor,” the firm noted that the attacks single out appliances that have remote management or SSL VPN

Continue Reading
Online Security
1 min read
41

Google Extends Support for Tracking Party Cookies Until 2023

June 26, 2021
0

Google’s sweeping proposals to deprecate third-party cookies in Chrome browser is going back to the drawing board after the company announced plans to delay the rollout from early 2022 to late 2023, pushing back the project by nearly two years. “While there’s considerable progress with this initiative, it’s become clear

Continue Reading
Online Security
1 min read
49

Reduce Business Risk By Fixing 3 Critical Endpoint-to-Cloud Security Requirements

June 25, 2021
0

Enterprise applications used to live securely in data centers and office employees connected to internal networks using company-managed laptops or desktops. And data was encircled by a walled perimeter to keep everything safe. All that changed in the last 18 months. Businesses and employees had to adapt quickly to cloud

Continue Reading
Online Security
1 min read
44

Pakistan-linked hackers targeted Indian power company with ReverseRat

June 24, 2021
0

A threat actor with suspected ties to Pakistan has been striking government and energy organizations in the South and Central Asia regions to deploy a remote access trojan on compromised Windows systems, according to new research. “Most of the organizations that exhibited signs of compromise were in India, and a

Continue Reading
Online Security
1 min read
42

Wormable DarkRadiation Ransomware Targets Linux and Docker Instances

June 23, 2021
0

Cybersecurity researchers have disclosed a new ransomware strain called “DarkRadiation” that’s implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control (C2) communications. “The ransomware is written in Bash script and targets Red Hat/CentOS and Debian Linux distributions,” researchers from Trend

Continue Reading