News Clipping


Stealth CrossRAT malware targets Windows, MacOS, and Linux systems[source: securityaffairs]

The popular former NSA hacker Patrick Wardle published a detailed analysis of the CrossRAT malware used by Dark Caracal for surveillance. Last week a joint report published by security firm Lookout and digital civil rights group the Electronic Frontier Foundation detailed the activity of a long-running hacking group linked to the Beirut Government and tracked as Dark Caracal. The hacking campaigns conducted by Dark Caracal leverage a custom Android malware...

Read More


Keylogger Campaign Hits Over 2,000 WordPress Sites [source: bleepingcomputer]

Security researchers have discovered over 2,000 WordPress sites —possibly more— infected with a keylogger that’s being loaded on the WordPress backend login page and a cryptojacking script (in-browser cryptocurrency miner) on their frontends. Researchers have tied these newly discovered infected sites to a similar operation that took place in early December 2017. The attack is quite simple. Miscreants find unsecured WordPress sites —usually running older WordPress versions...

Read More


Fb, Microsoft announce new privacy tools to comply with GDPR[source: helpnetsecurity]

In four months the EU General Data Protection Regulation (GDPR) comes into force, and companies are racing against time to comply with the new rules (and avoid being brutally fined if they fail). One of the things that the regulation mandates is that EU citizens must be able to get access to their personal data held by companies and information about how these personal data are being...

Read More


Understanding Motivations and Methods of Web Defacement [source: trendmicro]

Cybercrime takes on many forms, but one of the long-standing tactics attackers use is web defacement—the act of compromising and vandalizing a website. Typically, these attackers—known as web defacers—replace the original page with their own content, boldly stating a political or social message. This is not a new phenomenon, but it is an enduring one. We’ve analyzed data that goes back almost two decades, and...

Read More


Escape future ransomware attacks by leveraging the right technology[source: helpnetsecurity]

Last year, multiple industry verticals saw the extreme effects of ransomware, with WannaCry and Petya leading the pack in terms of damage. To make matters worse, according to a report by Kaspersky, the number of ransomware threats is expected to increase in 2018. The evolution of ransomware, resulting in more diverse and innovative attacks, is going to heavily hit enterprises in 2018. In my previous articles, I explained how ransomware has evolved...

Read More


SamSam Ransomware Hits Hospitals, City Councils, ICS Firms [source: bleepingcomputer]

The SamSam ransomware group seems to have gotten to a “great” start in 2018, hitting several high-profile targets such as hospitals, a city council, and an ICS firm. Reported attacks include the one against the Hancock Health Hospital in of Greenfield, Indiana; Adams Memorial Hospital in Decatur, Indiana; the municipality of Farmington, New Mexico; cloud-based EHR (electronic health records) provider Allscripts; and an unnamed ICS (Industrial Control Systems) company in the...

Read More


New Mirai Variant Targets Billions of ARC-Based Endpoints[source: infosecurity-magazine]

Security experts are warning of a new Mirai variant targeting ARC processors, which could have an even bigger impact than the notorious malware on which it is based. RISC-based ARC processors are widely used in IoT and embedded systems and said to beshipped in over 1.5 billion products each year. The new threat — named Okiru, which is Japanese for “wake up” — was first spotted...

Read More


How to Protect Your BitTorrent Client From This Potential Hack [source: lifehacker]

Still using BitTorrent to exclusively download legally acquired content like operating system images or files you want to share privately with friends? If so, you might want to double-check your security settings to protect yourself from what researchers at Google’s Project Zero are calling a “low complexity hack” affecting Transmission and other popular BitTorrent clients. The flaw could leave your computer vulnerable to control by malicious hackers, but you can...

Read More


DoS attacks against hard disk drives using acoustic signals [source: helpnetsecurity]

A group of Princeton and Purdue researchers has shown that it’s possible to mount a denial-of-service (DoS) attack against hard disk drives via acoustic signals. Threat severity Hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their increased reliability, fault tolerance, storage capacity, and so on. “These technological advances in HDDs, along with the ever-increasing need for storing the...

Read More


OnePlus confirms hack exposed credit cards of phone buyers [source: zdnet]

OnePlus has confirmed that its systems have been breached, following reports of credit card fraud from customers who bought a phone from the company. The phone maker sent an email to customers Friday, saying customers’ credit card numbers, expiry dates, and security codes “may have been compromised.” The email, posted by Peter Smallbone on Twitter, said: “As soon as we were made aware of the attack, we...

Read More


Page 35 of 62« First...102030...3334353637...405060...Last »