August 15, 2019
Via: Help Net SecurityAlthough exchanges, wallets and other cryptocurrency custody services are strengthening their defenses, attackers continue to innovate and outpace even the current state of the cybersecurity art, according to CipherTrace. Even Binance, the world’s number-one cryptocurrency exchange, lost tens of millions […]
Hacker, Network security, Threats & Malware
August 15, 2019
Via: Hot for SecurityChoice Hotels, a hospitality franchisor based in Maryland that owns chains such as Comfort Inn, MainStay Suites, Econo Lodge and Cambria Hotels, has suffered a cyber incident that exposed 700,000 guest records, including full names, addresses, phone numbers, email addresses […]
Threats & Malware, Vulnerabilities
August 13, 2019
Via: Dark ReadingAttackers have learned that vulnerabilities can hide in the gaps: gaps between components of a system or gaps in a process or procedure. A researcher last week at DEF CON in Las Vegas showed that device drivers — the small […]
July 30, 2019
Via: Help Net SecurityCapital One, one of the largest banks in the United States by assets, has announced that it has suffered a massive data breach affecting the personal and financial information of some 106 million individuals in the U.S. and Canada. Simultaneously, […]
July 20, 2019
Via: Kelly RedmondEvery headline-grabbing cyberattack unveils new sophisticated hacking techniques, but the attacker’s portrait remains the same: a modern-day professional with a strong sense of curiosity, patience, and social skills that thoroughly examines a company’s systems, takes note of every vulnerability, then […]
July 17, 2019
Via: Security WeekUS telecoms company Sprint has informed some customers that their Sprint accounts have been accessed by hackers via a Samsung website. In a letter sent out to impacted customers, Sprint said it learned of unauthorized access to accounts on June […]
July 16, 2019
Via: Security WeekRussia-linked threat group Turla has released new variants of the KopiLuwak Trojan in attacks detected since the beginning of this year, Kaspersky’s security researchers reveal. Also known as Venomous Bear, Waterbug, and Uroboros, the threat actor was discovered in 2014, […]
July 16, 2019
Via: Help Net SecurityArtificial intelligence (AI) is rapidly finding applications in nearly every walk of life. Self-driving cars, social media networks, cybersecurity companies, and everything in between uses it. But a new report published by the SHERPA consortium – an EU project studying […]
Hacker, Network security, Threats & Malware
July 15, 2019
Via: CSO OnlineBaltimore Mayor Jack Young announced last week that the U.S. Conference of Mayors (UCSM) passed a resolution calling on mayors to oppose the payment of ransomware attackers. The resolution states that “at least 170 county, city or state government systems […]
Application security, Email security, Hacker, Security, Threats & Malware
July 3, 2019
Via: Hot for SecurityUS Cyber Command has issued a warning about an unnamed foreign country’s attempt to spread malware through the exploitation of a vulnerability in Microsoft Outlook. The alert, posted on Twitter, refers to CVE-2017-11774, a vulnerability in Outlook that if exploited […]
June 28, 2019
Via: Threat PostA 14-year-old hacker used a new strain of malware this week to brick up to 4,000 insecure Internet of Things devices – before abruptly shutting down his command and control server. The malware, dubbed Silex, was first discovered by Larry […]
June 28, 2019
Via: Security AffairsHackers breached the infrastructure of PCM Inc., one of the major U.S.-based cloud solution provider. According to the popular investigator Brian Krebs, the attackers gained access to email and file sharing systems for some of the company clients. In 2018 […]
June 26, 2019
Via: Threat PostA city in Florida has paid hackers almost $500,000 after suffering a ransomware attack that locked down its email systems and servers – only the latest municipality to be hit by ransomware and pay the ransom. The Florida municipality, Lake […]
Threats & Malware, Vulnerabilities
June 12, 2019
Via: Security AffairsExperts at Alert Logic have discovered a vulnerability in the popular WordPress Live Chat plugin that could be exploited by an unauthorized remote attacker to steal chat logs or manipulate chat sessions. The critical vulnerability, tracked as CVE-2019-12498, is a […]
Hacker, Network security, Threats & Malware
June 11, 2019
Via: Help Net SecurityUS Customs and Border Protection (CBP) announced that a hacker may have stolen sensitive data collected by the agency from a subcontractor’s network. “On May 31, 2019, CBP learned that a subcontractor, in violation of CBP policies and without CBP’s […]
May 24, 2019
Via: Threat PostThe price of Bitcoin is steadily surging in May and hackers are looking to cash in on the uptick with fake cryptocurrency apps, malware and other related scams. In May 2019, Bitcoin prices climbed to their highest points this year, […]
Hacker, Network security, Threats & Malware
May 20, 2019
Via: The HillA bipartisan House delegation from Florida said Thursday they are pushing the FBI and Department of Homeland Security (DHS) to declassify the names of the two Sunshine State counties that Russia hacked during the 2016 presidential election. The delegation, led […]
May 20, 2019
Via: Security WeekA recently patched vulnerability in the Slack desktop application for Windows can be exploited by malicious actors to steal and manipulate a targeted user’s downloaded files. David Wells, a researcher at Tenable, discovered that version 3.3.7 of the Slack desktop […]
Email security, Malware, Phishing
May 14, 2019
Via: Help Net SecurityAlthough phishing has been around in various forms since the 1990s, recent news has shown that it continues to evolve – and remains a major threat. These days, phishing tactics are so sophisticated it can be difficult to spot a […]
May 14, 2019
Via: Security WeekThere are two primary characteristics of the Brazilian hacking scene: a focus on Brazil, and the adaptability of the hackers. Very strict money laws make trans-border money movement difficult, ensuring that most targets remain local; and the hackers tend to […]