News Clipping


ON WEDNESDAY, AT about 12:15 pm ET, 1.35 terabits per second of traffic hit the developer platform GitHub all at once. It was the most powerful distributed denial of service attack recorded to date—and it used an increasingly popular DDoS method, no botnet required. GitHub briefly struggled with intermittent outages as...

Read more


Cybercriminals are leveraging a recently patched critical Adobe Flash Player vulnerability in a massive spam campaign targeting unpatched computers. According to cybersecurity firm Morphisec, cybercriminals are blasting spam messages that urge recipients to click a link to download a Word document. And when a victim opens the document and enables macros,...

Read more

Free Decrypter Available for GandCrab Ransomware Victims [source: bleepingcomputer]

Bitdefender has released a free decrypter that helps victims of GandCrab ransomware infections recover files without paying the ransom. The decrypter is available for download via the NoMoreRansom project, of which Bitdefender is a member of. Romanian Police and Romania’s DIICOT (Directorate for Investigating Organized Crime and Terrorism) announced the decrypter’s launch in statements published on...

Read more

SAML Vulnerability Lets Attackers Log in as Other Users [source: bleepingcomputer]

Security researchers from Duo Labs and the US Computer Emergency Response Team Coordination Center (CERT/CC) will release security advisories today detailing a new SAML vulnerability that allows malicious attackers to authenticate as legitimate users without knowledge of the victim’s password. The flaw affects SAML (Security Assertion Markup Language), an XML-based markup language...

Read more

MS Word Maybe Used for Cryptojacking Attacks [source: hackread]

Cryptojacking JavaScript can be launched in Word documents – New Word features that appeared in its latest version made it possible – MS Word now allows adding video into the document by inserting an iFrame code. The file size does not increase as the video is played through a headless web browser...

Read more

Oracle Server Vulnerability Exploited to Deliver Double Monero Miner Payloads[trendmicro]

The sudden rise of cryptocurrency triggered a shift in the target landscape. Cybercriminals started adapting and using their resources to try acquiring cryptocurrencies, whether through pursuing repositories like Bitcoin wallets or by compromising networks and devices to mine the currency. This isn’t completely new — ransomware authors have been using bitcoin as their preferred currency...

Read more

Page 20 of 54« First...10...1819202122...304050...Last »