Security  

  •  
  • By Sergiu Gatlan
  • September 28th, 2018
IC3 Alerts of Increasing Danger of RDP Exploitation Attacks

IC3 Alerts of Increasing Danger of RDP Exploitation Attacks

Threat actors use RDP exploits for ransomware and data theft

  •  
  • By Sergiu Gatlan
  • September 28th, 2018
Fancy Bear Attacks Governments Using LoJax UEFI Rootkit

Fancy Bear Attacks Governments Using LoJax UEFI Rootkit

Attacks can be blocked by enabling Secure Boot

  •  
  • By Sergiu Gatlan
  • September 28th, 2018
Stealthy and Persistent Torii IoT Botnet Infects Devices via Telnet

Stealthy and Persistent Torii IoT Botnet Infects Devices via Telnet

The malware can compromise a large array of architectures

  •  
  • By Sergiu Gatlan
  • September 27th, 2018
Man Sentenced to 12 Months and One Day of Prison for ATM Jackpotting Heists

Man Sentenced to 12 Months and One Day of Prison for ATM Jackpotting Heists

The group attacked multiple ATMs in Connecticut

  •  
  • By Sergiu Gatlan
  • September 27th, 2018
US Voting Machines Can Be Hacked Remotely

US Voting Machines Can Be Hacked Remotely

Security flaws found in Model 650 machine DefCon conference

  •  
  • By Sergiu Gatlan
  • September 27th, 2018
Study Finds 83 Percent of Home Routers are Vulnerable to Attacks

Study Finds 83 Percent of Home Routers are Vulnerable to Attacks

28% of them are exposed to critical or high security risks

  •  
  • By Sergiu Gatlan
  • September 26th, 2018
Police Makes Fake Accounts for Snooping. Facebook Sends Harsh Letter.

Police Makes Fake Accounts for Snooping. Facebook Sends Harsh Letter.

Police refuses to comment because of ongoing litigation

  •  
  • By Sergiu Gatlan
  • September 26th, 2018
Researchers Describe Modular VPNFilter as the Swiss Army Knife of Malware

Researchers Describe Modular VPNFilter as the Swiss Army Knife of Malware

The multi-stage malicious framework compromised 500K devices

  •  
  • By Sergiu Gatlan
  • September 26th, 2018
DoorDash Accounts Hacked in Credential Stuffing Attack

DoorDash Accounts Hacked in Credential Stuffing Attack

Company confirms the security incident on its blog

  •  
  • By Sergiu Gatlan
  • September 26th, 2018
Android Banking Trojan with 10K Installs Can Bypass Two-Factor Authentication

Android Banking Trojan with 10K Installs Can Bypass Two-Factor Authentication

The malware was posing as a legitimate phone call recorder

  •  
  • By Sergiu Gatlan
  • September 26th, 2018
DHS Drone Data Vulnerable to Hackers, Inside Threats

DHS Drone Data Vulnerable to Hackers, Inside Threats

Surveillance info was not safeguarded as per regulations

  •  
  • By Sergiu Gatlan
  • September 25th, 2018
SMS Phishing Campaign Attacks Unaware Job Hunters

SMS Phishing Campaign Attacks Unaware Job Hunters

Text messages can be used as an effective phishing tool too

  •  
  • By Sergiu Gatlan
  • September 25th, 2018
Cryptojackers Infiltrated Google Play Again

Cryptojackers Infiltrated Google Play Again

More than 25 Android apps found to mine for cryptocoins

  •  
  • By Sergiu Gatlan
  • September 25th, 2018
Chrome 69 Does Not Delete Google Cookies when Clearing All Website Data

Chrome 69 Does Not Delete Google Cookies when Clearing All Website Data

Only happens when the user is logged into Google Chrome

  •  
  • By Sergiu Gatlan
  • September 25th, 2018
Micropatch Released by 0patch for Windows Zero-Day

Micropatch Released by 0patch for Windows Zero-Day

Will protect users until Microsoft releases an official fix

  •  
  • By Sergiu Gatlan
  • September 24th, 2018
$854 Million Worth of Cryptocurrencies Stolen in 2018

$854 Million Worth of Cryptocurrencies Stolen in 2018

$524 million were stolen in the Coincheck hack alone

  •  
  • By Sergiu Gatlan
  • September 24th, 2018
Adwind Trojan Variant Avoids Detection and Steals Files, Keystrokes, More

Adwind Trojan Variant Avoids Detection and Steals Files, Keystrokes, More

Uses Microsoft Excel code injection attack to attack targets

 
Want more? Browse: