web analytics

Adware the series, the final: Tools section

  See Also: Adware the series, part 1 Adware the series, part 2 Adware the series, part 3 Adware the series, part 4 Adware the series, part 5 Adware the series, part 6     July 19th 2017 By Pieter Arntz   So far in this series, we have handed you some methods to recognize… Continue reading Adware the series, the final: Tools section

Apple Security Updates July 19th 2017

Get the latest software updates from Apple   Keeping your software up to date is one of the most important things you can do to maintain your Apple product’s security.   The latest version of iOS is 10.3.3. Learn how to update the iOS software on your iPhone, iPad, or iPod touch. The latest version of… Continue reading Apple Security Updates July 19th 2017

Wikileaks: CIA tasked Raytheon for analyzing TTPs used by threat actors in the wild

July 19, 2017  By Pierluigi Paganini Wikileaks revealed that CIA contractor Raytheon Blackbird Technologies was tasked to analyze advanced malware and TTPs used by threat actors in the wild.   Wikileaks continues to publish documents from Vault 7 leaks, today the organization has shed light on the collaboration between the US Intelligence agency and tech firms for… Continue reading Wikileaks: CIA tasked Raytheon for analyzing TTPs used by threat actors in the wild

“Bad Taste” Vulnerability Affects Linux Systems via Malicious Windows MSI Files

19th July 2017  By Catalin Cimpanu     Because Windows executables haven’t wreaked enough damage on Windows computers, now you can use malformed MSI files to run malicious code on Linux systems.   This scenario is possible because of a vulnerability discovered by German IT expert Nils Dagsson Moskopp, which he named “Bad Taste.”  … Continue reading “Bad Taste” Vulnerability Affects Linux Systems via Malicious Windows MSI Files

DarkHotel attackers return, with major shift in method

Instead of shared WiFi, DarkHotel’s new attack pattern delivers its payload through social engineering and a Trojan   July 19th 2017  By Tom Allen   A new high-level spear-phishing (whaling) attack has been found by BitDefender, targeting political figures and senior business users. Dubbed Inexsmar, the attack appears to be operated by the DarkHotel group,… Continue reading DarkHotel attackers return, with major shift in method

Google G-Suite spotted erecting stiff member vetting tool

App verification signage aims to give phishing the finger By Thomas Claburn in San Francisco 18 Jul 2017     Stung by phishing attacks aimed at G Suite users earlier this year, Google has armored its cloud with extra security layers.   Following recent defenses against the dark arts – security key enforcement, app name vetting,… Continue reading Google G-Suite spotted erecting stiff member vetting tool

Oracle Critical Patch Update Advisory – July 2017

Oracle Critical Patch Update Advisory – July 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed… Continue reading Oracle Critical Patch Update Advisory – July 2017

Oracle E-Business Suite Flaw Allows Downloads of Documents

18th July 2017  by Michael Mimoso     Oracle admins have more than 300 patches to contend with today, but one that should be considered a top priority is a bug in the E-Business Suite of business applications that could allow an attacker to download data without the need for authentication.   The vulnerability, CVE-2017-10244,… Continue reading Oracle E-Business Suite Flaw Allows Downloads of Documents

Devil’s Ivy: Flaw in Widely Used Third-party Code Impacts Millions

18th July 2017    SummaryGiven the increasingly vital role IoT plays in modern life, we strive to improve the state of IoT security and share the knowledge we gain through our research with IoT manufacturers and users. Our latest discovery was found in an Axis Communications security camera — the M3004 model. Axis Communications is one… Continue reading Devil’s Ivy: Flaw in Widely Used Third-party Code Impacts Millions

Two CryptoMix Ransomware variants emerged in a few days

July 18, 2017  By Pierluigi Paganini Two CryptoMix Ransomware variants emerged in a few days, a circumstance that suggests the operators behind the threat are very active. Malwarebytes’ researcher Marcelo Rivero has spotted a new variant of the CryptoMix ransomware.   The CryptoMix Malware family was spotted more than a year ago, numerous improvements were added across the time,… Continue reading Two CryptoMix Ransomware variants emerged in a few days