See Also: Adware the series, part 1 Adware the series, part 2 Adware the series, part 3 Adware the series, part 4 Adware the series, part 5 Adware the series, part 6 July 19th 2017 By Pieter Arntz So far in this series, we have handed you some methods to recognize… Continue reading Adware the series, the final: Tools section
Author: admin
Apple Security Updates July 19th 2017
Get the latest software updates from Apple Keeping your software up to date is one of the most important things you can do to maintain your Apple product’s security. The latest version of iOS is 10.3.3. Learn how to update the iOS software on your iPhone, iPad, or iPod touch. The latest version of… Continue reading Apple Security Updates July 19th 2017
Wikileaks: CIA tasked Raytheon for analyzing TTPs used by threat actors in the wild
July 19, 2017 By Pierluigi Paganini Wikileaks revealed that CIA contractor Raytheon Blackbird Technologies was tasked to analyze advanced malware and TTPs used by threat actors in the wild. Wikileaks continues to publish documents from Vault 7 leaks, today the organization has shed light on the collaboration between the US Intelligence agency and tech firms for… Continue reading Wikileaks: CIA tasked Raytheon for analyzing TTPs used by threat actors in the wild
“Bad Taste” Vulnerability Affects Linux Systems via Malicious Windows MSI Files
19th July 2017 By Catalin Cimpanu Because Windows executables haven’t wreaked enough damage on Windows computers, now you can use malformed MSI files to run malicious code on Linux systems. This scenario is possible because of a vulnerability discovered by German IT expert Nils Dagsson Moskopp, which he named “Bad Taste.” … Continue reading “Bad Taste” Vulnerability Affects Linux Systems via Malicious Windows MSI Files
DarkHotel attackers return, with major shift in method
Instead of shared WiFi, DarkHotel’s new attack pattern delivers its payload through social engineering and a Trojan July 19th 2017 By Tom Allen A new high-level spear-phishing (whaling) attack has been found by BitDefender, targeting political figures and senior business users. Dubbed Inexsmar, the attack appears to be operated by the DarkHotel group,… Continue reading DarkHotel attackers return, with major shift in method
Google G-Suite spotted erecting stiff member vetting tool
App verification signage aims to give phishing the finger By Thomas Claburn in San Francisco 18 Jul 2017 Stung by phishing attacks aimed at G Suite users earlier this year, Google has armored its cloud with extra security layers. Following recent defenses against the dark arts – security key enforcement, app name vetting,… Continue reading Google G-Suite spotted erecting stiff member vetting tool
Oracle Critical Patch Update Advisory – July 2017
Oracle Critical Patch Update Advisory – July 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed… Continue reading Oracle Critical Patch Update Advisory – July 2017
Oracle E-Business Suite Flaw Allows Downloads of Documents
18th July 2017 by Michael Mimoso Oracle admins have more than 300 patches to contend with today, but one that should be considered a top priority is a bug in the E-Business Suite of business applications that could allow an attacker to download data without the need for authentication. The vulnerability, CVE-2017-10244,… Continue reading Oracle E-Business Suite Flaw Allows Downloads of Documents
Devil’s Ivy: Flaw in Widely Used Third-party Code Impacts Millions
18th July 2017 SummaryGiven the increasingly vital role IoT plays in modern life, we strive to improve the state of IoT security and share the knowledge we gain through our research with IoT manufacturers and users. Our latest discovery was found in an Axis Communications security camera — the M3004 model. Axis Communications is one… Continue reading Devil’s Ivy: Flaw in Widely Used Third-party Code Impacts Millions
Two CryptoMix Ransomware variants emerged in a few days
July 18, 2017 By Pierluigi Paganini Two CryptoMix Ransomware variants emerged in a few days, a circumstance that suggests the operators behind the threat are very active. Malwarebytes’ researcher Marcelo Rivero has spotted a new variant of the CryptoMix ransomware. The CryptoMix Malware family was spotted more than a year ago, numerous improvements were added across the time,… Continue reading Two CryptoMix Ransomware variants emerged in a few days