FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Cryptojacking campaign exploiting Apache Struts 2 flaw kills off the competition

Proof-of-concept (PoC) exploits have been quickly adopted to compromise Linux systems.
  • September 5th 2018 at 08:59

FIN6 returns to attack retailer point of sale systems in US, Europe

The secretive cyberattackers are known for stealing credit card data to sell on the Dark Web.
  • September 5th 2018 at 10:00

Thousands of MikroTik routers are snooping on user traffic

The routers susceptible to hijacking at being exploited through a known vulnerability.
  • September 5th 2018 at 10:31

New Silence hacking group suspected of having ties to cyber-security industry

New Russian-speaking "Silence" group linked to the theft of at least $800,000 from Russian and Eastern European banks and financial institutions.
  • September 5th 2018 at 11:01

Google investigating issue with blurry fonts on new Chrome 69

Font rendering appears to have broken down when Google promoted Chrome 69 from the Beta to the Stable channel. Windows users affected.
  • September 5th 2018 at 15:00

Recent Windows ALPC zero-day has been exploited in the wild for almost a week

ESET says it detected PowerPool group using recently disclosed Windows ALPC zero-day to improve the efficiency of its malware.
  • September 5th 2018 at 17:08

Google fixes Chrome issue that allowed theft of WiFi logins

New Wi-Jacking attack can recover WPA2 pre-shared keys by abusing a Google Chrome design issue. Issue was correct in Chrome 69.
  • September 5th 2018 at 23:08

Vodafone: You used 1234 as your password and were hacked? You cover the cost

Updated: Hackers are behind bars for stealing $30,000 from accounts, but Vodafone wants their victims to pay the tab.
  • September 6th 2018 at 08:14

Cisco warns customers of critical security flaws, advisory includes Apache Struts

The massive security update includes a patch for the recently-disclosed Apache bug -- but not all products will be fixed yet.
  • September 6th 2018 at 09:02

Schneider Electric Modicon vulnerability impacts ICS operation in industrial settings

The security flaw, if left unpatched, has the potential to cause unnecessary reboots.
  • September 6th 2018 at 10:00

The ultimate guide to finding and killing spyware and stalkerware on your smartphone

Surveillance isn't just the purview of nation-states and government agencies -- sometimes, it is closer to home.
  • September 6th 2018 at 10:21

Tor Browser gets a redesign, switches to new Firefox Quantum engine

Tor Browser finally updated to use new-and-improved Firefox Quantum codebase. This includes new Photon UI.
  • September 6th 2018 at 11:12

Vulnerabilities found in the remote management interface of Supermicro servers

Eclypsium researchers disclose second vulnerability affecting Supermicro servers in the past three months
  • September 6th 2018 at 13:01

DOJ to charge North Korean officer for Sony hack and WannaCry ransomware

After charging Chinese, Iranian, and Russian cyberspies, US prepares indictment against North Korean officer.
  • September 6th 2018 at 15:35

Tesla modifies product policy to accommodate "good-faith" security research

Tesla promises to reset car firmware and software damaged during security research. Also promises not to go after "good-faith" researchers in court.
  • September 6th 2018 at 17:32

How US authorities tracked down the North Korean hacker behind WannaCry

US authorities put together four years worth of malware samples, domain names, email and social media accounts to track down one of the Lazarus Group hackers.
  • September 6th 2018 at 21:43

Alex Stamos: Pretty clear GRU's goal was to weaken a future Clinton presidency

Former Facebook CSO breaks down differences between fake news, GRU operations, and IRA troll farms
  • September 7th 2018 at 00:22

Hacker uses ProtonMail VPN. Hacker DDoSes ProtonMail. Hacker gets arrested.

Braggadocio teen part of up-and-coming Apophis Squad hacking squad fails to protect his identity. Gets promptly arrested by UK police. Pleads guilty.
  • September 7th 2018 at 01:58

Schneider Electric may have shipped USB drives infested with malware

The flash drives were "contaminated" during the manufacturing process.
  • September 7th 2018 at 07:18

Top Mac anti-adware software in App Store steals your browsing history

A Mac app ranked in the top App Store tiers secretly sends the browsing history of users to a server in China.
  • September 7th 2018 at 14:13

US government releases post-mortem report on Equifax hack

GAO report takes us inside Equifax from March 2017 onward, showing how a few slip-ups led to one of the biggest breaches in US history.
  • September 7th 2018 at 18:17

Tor Project releases first alpha of Android mobile browser

After yesterday the Tor Project released Tor Browser v8, today, the organization had another surprise in store for its loyal fanbase β€”an Android mobile browser.
  • September 7th 2018 at 19:48

That's What Hackers Do - Enterprise Security Weekly #105

By paul@securityweekly.com

This week, Paul and John talk BitSight, SentinelOne, Swimlane, Fortinet, and more! After the Enterprise News, we air some pre-recorded interviews from Black Hat and DEF CON with Mimecast CTO Marc French, Director of Solutions of Synopsys Ofer Maor, CEO of ThreatX Bret Settle, and Willy Leichter of Virsec!

Β 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode105

Β 

Visit https://www.securityweekly.com/esw for all the latest episodes!

Β 

Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter!

Β 

β†’Visit our website: https://www.securityweekly.com

β†’Follow us on Twitter: https://www.twitter.com/securityweekly

β†’Like us on Facebook: https://www.facebook.com/secweekly

  • September 7th 2018 at 21:00

Tens of iOS apps caught collecting and selling location data

Apps collect data such as GPS coordinates, WiFi network IDs and more, and pass all of it to advertising and monetization firms.
  • September 7th 2018 at 23:03

Bill that would have the White House create a database of APT groups passes House vote

US hopes that a name-and-shame strategy would deter foreign nation-state hacking groups to attack US infrastructure as often as now.
  • September 8th 2018 at 00:39

Angry Floppy Birds - Paul's Security Weekly #574

By paul@securityweekly.com

This week, Paul and the crew sit down with Wim Remes, Founder and Principal Consultant at Wire Security! In our Technical Segment, we welcome back Chris Brenton, Chief Operating Officer for Active Countermeasures, in which he explains why Beacon Analysis in an integral part of threat hunting! In the Security News this week, Vulnerabilities found in remote management interface of Supermicro servers, Google fixes Chrome issue that allowed theft of WiFi logins, U.S. to charge North Korean spy over WannaCry and Sony Pictures hack, how to manipulate Apple’s podcast charts, and a Spanish driver that tests positive for every drug on the test. All that and more, on this episode of Paul’s Security Weekly!

Full Show Notes: https://wiki.securityweekly.com/Episode574

Β 

** Link to slides for the Technical Segment can be found in the show notes!

Visit https://www.securityweekly.com/psw for all the latest episodes!

Β 

β†’Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter!!

β†’Follow us on Twitter: https://www.twitter.com/securityweekly

β†’Like us on Facebook: https://www.facebook.com/secweekly

  • September 8th 2018 at 09:00

Peeled onions and a Minus Touch: Verizon data breach digest lifts the lid on theft tactics

The 2018 report gives us a glimpse of tactics hackers are using today in the name of data exfiltration.
  • September 8th 2018 at 16:43

Worries arise about security of new WebAuthn protocol

Cryptography experts point out that new WebAuthn protocol recommends or requires the implementation of old and weak algorithms known to be vulnerable to attacks for years
  • September 9th 2018 at 01:06

Standard to protect against BGP hijack attacks gets first official draft

NIST and DHS project publishes first draft of new BGP Route Origin Validation (ROV) standard that will help ISPs and cloud providers protect against BGP hijack attacks.
  • September 9th 2018 at 15:21

Popular VPNs contained code execution security flaws, despite patches

Updated: Patches applied to a vulnerability in ProtonVPN and NordVPN builds led to the discovery of separate bugs which had to be resolved quickly in recent updates.
  • September 10th 2018 at 06:59

Mirai, Gafgyt IoT botnets stab systems with Apache Struts, SonicWall exploits

Updated: The IoT botnets are back with a new arsenal containing a vast array of vulnerabilities.
  • September 10th 2018 at 09:05

These are the warning signs of a fraudulent ICO

Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fake and what is legitimate?
  • September 10th 2018 at 10:45

Researcher finds new malware persistence method leveraging Microsoft UWP apps

New malware persistence method works only on Windows 10 and abuses built-in UWP apps like the Cortana and People apps.
  • September 10th 2018 at 10:47

LuckyMouse uses malicious NDISProxy Windows driver to target gov't entities

The hacking group is covertly infecting Windows machines with Trojans by way of stolen certificates belonging to a Chinese security company.
  • September 10th 2018 at 13:24

Exploit vendor drops Tor Browser zero-day on Twitter

A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable.
  • September 10th 2018 at 14:29

Microsoft details for the first time how it classifies Windows security bugs

The Microsoft Security Response Center publishes two documents detailing internal procedures used by its staff to prioritize and classify security bugs.
  • September 10th 2018 at 20:46

Tech support scammers find a home on Microsoft TechNet pages

Security researcher finds over 3,000 TechNet pages flooded with tech support scams pushing shady phone numbers for cryptocurrency exchanges and social media platforms.
  • September 10th 2018 at 23:28

British Airways breach caused by the same group that hit Ticketmaster

Security researchers find clues connecting the Magecart group to the breach at British Airways.
  • September 11th 2018 at 07:00

The Internal Network - Business Security Weekly #98

By paul@securityweekly.com

This week, we share a Pre-Recorded interview with Gabriel Gumbs, VP of Product Strategy at STEALTHbits! We talk about moving from detection to prevention, and protecting your data! In Tracking Security Innovation, Imperva acquires app security firm Prevoty, Allstate accelerates expansion into Identity Protection, 100+ startups globally accepted into StackPaths Propel startup program, Kaseya acquires RapidFire Tools, Very Good security makes data unhackable with Andreessen, and some excellent funding rounds from various companies!

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode98

Β 

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Β 

Visit https://www.activecountermeasures/bsw to sign up for a demo or buy our AI Hunter!!

Β 

β†’Visit our website: https://www.securityweekly.com

β†’Follow us on Twitter: https://www.twitter.com/securityweekly

β†’Like us on Facebook: https://www.facebook.com/secweekly

  • September 11th 2018 at 09:00

How to steal a Tesla Model S in seconds

An attack technique has been revealed which allows threat actors to unlock a Tesla vehicle in no time at all.
  • September 11th 2018 at 09:28

Alexa's land-and-expand strategy is racking up the numbers

While Google is outselling Amazon in global units of smart speakers, other numbers show Amazon is doing just fine in expanding Alexa's reach and usage
  • September 11th 2018 at 12:00

'Father of Zeus' Kronos malware exploits Office bug to hijack your bank account

The $7000 malware shows there is serious money to be made in the banking Trojan market.
  • September 11th 2018 at 12:00

Online security 101: Tips for protecting your privacy from hackers and spies

This simple advice will help to protect you against hackers and government surveillance.
  • September 11th 2018 at 13:18

First IoT security bill reaches governor's desk in California

California IoT security bill criticized by security researcher. Expert says bill "is based upon an obviously superficial understanding of the problem."
  • September 11th 2018 at 15:53

HITB Armory – Call for Tools is OPEN! (Dubai, UAE)

By MaxiSoler
We’re pleased to announce the first ever HackInTheBox Armory! The HITB Armory is where you can showcase your security tools to the world. You will get 30 minutes to present your tools onstage,...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Microsoft patches recent ALPC zero-day in September 2018 Patch Tuesday updates

Microsoft engineers patch 62 vulnerabilities, including 17 rated 'Critical'
  • September 11th 2018 at 19:45

Hack Naked News #188 - September 11, 2018

By paul@securityweekly.com

This week, stealing your Tesla, British Airways hack, Equifax long list of mistakes, Windows 7 support, oops I forgot to encrypt your chats, I can see your browser history, Tor browsers, VPNs and Coldfusion? Jason Wood from Paladin Security joins us for expert commentary, so stay tuned for this episode of Hack Naked News!

Β 

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode188

Β 

Visit https://www.securityweekly.com/hnn for all the latest episodes!

Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter!!

Β 

β†’Visit our website: https://www.securityweekly.com

β†’Follow us on Twitter: https://www.twitter.com/securityweekly

β†’Like us on Facebook: https://www.facebook.com/secweekly

  • September 11th 2018 at 20:12

Judge rules cryptocurrency ICO scam case falls under securities law

Judge rules that initial coin offerings are "securities" and SEC can go after ICO scammers for securities fraud under US securities laws.
  • September 11th 2018 at 23:06

Publication of PoC in popular WordPress plugin leads to scans for vulnerable sites

WordPress security firm Defiant reports "very noticeable uptick" in scans for vulnerable plugin installations.
  • September 12th 2018 at 05:20

Adobe patch update tackles six critical vulnerabilities in ColdFusion

The worst vulnerabilities lead to arbitrary code execution.
  • September 12th 2018 at 08:42

Around the World - Application Security Weekly #31

By paul@securityweekly.com

This week, Keith and Paul interview Zane Lackey, Chief Security Officer and Founder of Signal Sciences! In the news, U.S. government releases Post-mortem on Equifax, Microsoft Windows Zero-Day found in Task Scheduler, British Airways breached via XSS, Windows subsystem Linux for Linux Distros, Bug Bounties and mental health, and more on this episode of Application Security Weekly!

Β 

Full Show Notes: https://wiki.securityweekly.com/ASW_Episode31

Β 

Visit https://www.securityweekly.com/asw for all the latest episodes!

Β 

Visit https://www.activecountermeasures/asw to sign up for a demo or buy our AI Hunter!

Β 

β†’Visit our website: https://www.securityweekly.com

β†’Follow us on Twitter: https://www.twitter.com/securityweekly

β†’Like us on Facebook: https://www.facebook.com/secweekly

  • September 12th 2018 at 09:00

Data management firm Veeam mismanages own data, leaks millions of records

Updated: The server was reportedly available for anyone to access and lacked any form of protection against intrusion.
  • September 12th 2018 at 09:35

OpenSSL 1.1.1 out with TLS 1.3 support and "complete rewrite" of RNG component

TLS 1.3 brings speed improvements and better cryptography to OpenSSL, the most popular open source cryptography library on the market
  • September 12th 2018 at 10:20

Feedify becomes latest victim of the Magecart malware campaign

Magecart crew strikes again! This time they infect the infrastructure of a website push notification service.
  • September 12th 2018 at 15:43

A question of security: What is obfuscation and how does it work?

With off-the-shelf malware becoming increasingly popular, hackers need to use a variety of techniques to disguise their activities.
  • September 12th 2018 at 16:00

Uproar after Adobe winds down Magento rewards-based bug bounty program

Adobe announces plans to integrate Magento bug bounty program into existing vulnerabilities disclosure platform that offers no monetary rewards to bug hunters.
  • September 12th 2018 at 16:44

State Department shamed for poor adoption of multi-factor authentication

Senators demand answers after government report finds that only 11 percent of the Department of State's devices use multi-factor authentication.
  • September 12th 2018 at 20:01

Brave browser files GDPR breach complaints against Google in the EU

Google and fellow ad tech firms accused of violating GDPR during the "bid request" process used in behavioral ads.
  • September 12th 2018 at 21:45

Scareware scheme operator thrown behind bars for targeting US media

Visitors of the Minneapolis Star Tribune found their computers infected with malware and were exposed to fake Windows support messages.
  • September 13th 2018 at 08:13

New cold boot attack affects 'nearly all modern computers'

Security researchers find a new way to disable current cold boot attack firmware security measures to steal sensitive data from high-value computers.
  • September 13th 2018 at 08:30
❌