Security  

  •  
  • By Sergiu Gatlan
  • December 11th, 2018
Novidade Exploit Kit Actively Targeting SOHO and Home Routers

Novidade Exploit Kit Actively Targeting SOHO and Home Routers

Malware campaign uses CSRF to change routers' DNS settings

  •  
  • By Sergiu Gatlan
  • December 11th, 2018
ESET Unearths Android Trojan That Steals Funds from 2FA-Secured PayPal Accounts

ESET Unearths Android Trojan That Steals Funds from 2FA-Secured PayPal Accounts

The Android malware can steal funds in under 5 seconds

  •  
  • By Sergiu Gatlan
  • December 11th, 2018
Third-Party Investigation Finds No Malicious Chips on Supermicro Motherboards

Third-Party Investigation Finds No Malicious Chips on Supermicro Motherboards

No malicious hardware found by customers, US agencies either

  •  
  • By Sergiu Gatlan
  • December 10th, 2018
$807,130 Stolen by Hackers After Cape Cod Community College Phishing Attack

$807,130 Stolen by Hackers After Cape Cod Community College Phishing Attack

College managed to recover only $278,887

  •  
  • By Sergiu Gatlan
  • December 10th, 2018
Europol Hits Darknet Ring That Shipped Counterfeit Money All Over Europe

Europol Hits Darknet Ring That Shipped Counterfeit Money All Over Europe

The group sold tens of thousands of counterfeit banknotes

  •  
  • By Sergiu Gatlan
  • December 10th, 2018
US Office of Personnel Management Still Vulnerable to Hacking According to GAO

US Office of Personnel Management Still Vulnerable to Hacking According to GAO

OPM implemented only 64% of 2015 incident suggestions

  •  
  • By Sergiu Gatlan
  • December 10th, 2018
Personal Information of 52.5 Million Exposed by New Google+ People API Bug

Personal Information of 52.5 Million Exposed by New Google+ People API Bug

The Google+ APIs to be shut down within 90 days

  •  
  • By Sergiu Gatlan
  • December 10th, 2018
Quincy City Hall Infected with Emotet, Hacked Emails Used in Phishing Scheme

Quincy City Hall Infected with Emotet, Hacked Emails Used in Phishing Scheme

The entire computing system shut down after the attack

  •  
  • By Sergiu Gatlan
  • December 7th, 2018
Attackers Use Localized Card Stealing Scripts, Forms to Plunder Their Victims

Attackers Use Localized Card Stealing Scripts, Forms to Plunder Their Victims

E-commerce sites users now burglarized in their own language

  •  
  • By Sergiu Gatlan
  • December 7th, 2018
Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report

Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report

This type of attack is ten times more likely to succeed

  •  
  • By Sergiu Gatlan
  • December 7th, 2018
Addresses and Names of Customers Exposed by Bethesda in Support Tickets

Addresses and Names of Customers Exposed by Bethesda in Support Tickets

Bethesda faces a €20 million fine under EU's GDPR

  •  
  • By Sergiu Gatlan
  • December 7th, 2018
Android Developers Warned to Remove Third-Party Ad Fraud SDKs from Apps

Android Developers Warned to Remove Third-Party Ad Fraud SDKs from Apps

Warning comes after removing Cheetah Mobile, Kika Tech apps

  •  
  • By Sergiu Gatlan
  • December 7th, 2018
'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer

'Open-Source' DarthMiner Malware Targets Adobe Pirates with Cryptominer

Also contains a disabled encrypted traffic sniffer module

  •  
  • By Sergiu Gatlan
  • December 7th, 2018
U.S. Commercial Chains Targeted by TA505 with Personalized Malware Campaigns

U.S. Commercial Chains Targeted by TA505 with Personalized Malware Campaigns

Multiple malware strains used to bank on holiday sales

  •  
  • By Sergiu Gatlan
  • December 6th, 2018
IoT Botnets Behind 78% of Malware Network Events in 2018 According to Report

IoT Botnets Behind 78% of Malware Network Events in 2018 According to Report

150 million devices used during the malware analysis process

  •  
  • By Sergiu Gatlan
  • December 6th, 2018
Payment Info Stolen from High-Profile Stores' Users via Formjacking Redirection

Payment Info Stolen from High-Profile Stores' Users via Formjacking Redirection

The campaign targeted top worldwide shopping websites

  •  
  • By Sergiu Gatlan
  • December 6th, 2018
CyptoJacking Campaign Used Two Malware Strains to Target IoT and Linux Devices

CyptoJacking Campaign Used Two Malware Strains to Target IoT and Linux Devices

Linux Rabbit and Rabbot install CNRig and CoinHive miners

 
Want more? Browse: