FreshRSS

🔒
☐ ☆ ✇ ToolsWatch.org – The Hackers Arsenal Tools Portal

T.rex_scan v0.2 – Integrate Tools to Audit Web Sites

By MaxiSoler — March 20th 2018 at 18:23
T.rex_scan only facilitates the visualization when auditing a web page. With this script you can optimize your time, reducing the time you audit a page web since T.rex_scan executes the task you...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
☐ ☆ ✇ http://blog.trendmicro.com/feed

Don’t Let the Vulnera-Bullies Win. Use our free tool to see if you are patched against Vulnerability CVE-2020-0601

By Trend Micro — January 17th 2020 at 17:40

So much for a quiet January! By now you must have heard about the new Microsoft® vulnerability CVE-2020-0601, first disclosed by the NSA (making it the first Windows bug publicly attributed to the National Security Agency). This vulnerability is found in a cryptographic component that has a range of functions—an important one being the ability to digitally sign software, which certifies that the software has not been tampered with. Using this vulnerability, attackers can sign malicious executables to make them look legitimate, leading to potentially disastrous man-in-the-middle attacks.

 

Here’s the good news. Microsoft has already released a patch to protect against any exploits stemming from this vulnerability. But here’s the catch: You have to patch!

While Trend Micro offers industry-leading virtual patching capabilities via our endpoint, cloud, and network security solutions, the best protection against vulnerabilities is to deploy a real patch from the software vendor. Let me say it again for effect – the best protection against this very serious vulnerability is to ensure the affected systems are patched with Microsoft’s latest security update.

We understand how difficult it can be to patch systems in a timely manner, so we created a valuable tool that will test your endpoints to see if whether they have been patched against this latest threat or if they are still vulnerable. Additionally, to ensure you are protected against any potential threats, we have just released additional layers of protection in the form of IPS rules for Trend Micro Deep Security™ and Trend Micro Vulnerability Protection™ (including Trend Micro Apex One™).  This was rolled out to help organizations strengthen their overall security posture and provide some protection during lengthy patching processes.

 

You can download our Trend Micro Vulnerability Assessment Tool right now to see if you are protected against the latest Microsoft vulnerability. And while you’re at it, check out our latest Knowledge Based Article for additional information on this new vulnerability along with Trend Micro security capabilities that help protect customers like you 24/7. Even during those quiet days in January.

The post Don’t Let the Vulnera-Bullies Win. Use our free tool to see if you are patched against Vulnerability CVE-2020-0601 appeared first on .

☐ ☆ ✇ http://blog.trendmicro.com/feed

Risk Decisions in an Imperfect World

By Mark Nunnikhoven (Vice President, Cloud Research) — June 30th 2020 at 12:57

Risk decisions are the foundation of information security. Sadly, they are also one of the most often misunderstood parts of information security.

This is bad enough on its own but can sink any effort at education as an organization moves towards a DevOps philosophy.

To properly evaluate the risk of an event, two components are required:

  1. An assessment of the impact of the event
  2. The likelihood of the event

Unfortunately, teams—and humans in general—are reasonably good at the first part and unreasonably bad at the second.

This is a problem.

It’s a problem that is amplified when security starts to integration with teams in a DevOps environment. Originally presented as part of AllTheTalks.online, this talk examines the ins and outs of risk decisions and how we can start to work on improving how our teams handle them.

 

The post Risk Decisions in an Imperfect World appeared first on .

☐ ☆ ✇ http://blog.trendmicro.com/feed

Ask Me Anything – Celebrating The Fifth Anniversary Of My Monthly Threat Webinar

By Jon Clay (Global Threat Communications) — July 13th 2020 at 12:39

In July 2015, I did my first threat webinar. I had planned to do it on a monthly basis, and never imagined I would still be doing it five years later, but here I am, still creating monthly webinars. I still do. I started the webinar series to help people understand the different threats targeting our customers and I have always tried to focus on three areas:

  • Share information on what threats our customers deal with regularly
  • Talk about an actual threat and explain how it works
  • Discuss technologies versus solutions

This last point, discussing technologies versus solutions, has been one of the key items I try to follow as much as possible – after all, the goal of my webinars is to be educational, not a sales pitch.

Coming from a technical background, BS in Electrical Engineering from Michigan State University (Go Spartans!!), I enjoy learning about the new technologies being used to detect the latest threats and to ensure you know what to look for when selecting a vendor and/or a security solution. Over the years, I’ve discussed everything from APTs, coinminers, exploits, messaging threats, ransomware, underground activity and lots in between. It is pretty easy to find topics to discuss, as there is so much going on in our industry, and with the malicious actors regularly shifting their tactics, techniques and procedures, I can keep the content fairly fresh.

I really enjoy having guest speakers on my webinars to mix things up a bit for the viewers as well, as I know my limitations – there are just too many threats out there to keep up with all of them. The main reason I love doing the threat webinars is that I enjoy sharing information and teaching others about our industry and the threats affecting them.  If you want to check out any of my previous five years of webinars you can watch them here.

For my fifth year anniversary I wanted to try something different and I would like to do an open Q&A session. As I’ve never done this before, it will certainly be an interesting experience for me, but hopefully for you as well. I hope I can answer a majority of your questions, but I know some of you are way too smart for me, so please bear with me.

Our registration page for this webinar allows you to submit any pre-session questions that I’ll answer throughout the webinar. You can ask me anything that is on your mind and if I cannot get to your question, I’ll do my best to answer you afterwards in an email.

I hope to continue to do these webinars for the foreseeable future and I would like to end my post by thanking each and every one of you who has participated in my webinars over the years. It has been a pleasure, and I look forward to answering your questions.

Take care, stay healthy, and keep on smiling!

Jon

The post Ask Me Anything – Celebrating The Fifth Anniversary Of My Monthly Threat Webinar appeared first on .

☐ ☆ ✇ InfoSec Resources

How to mitigate Format String Vulnerabilities

By Srinivas — September 29th 2020 at 19:46

Introduction: This article provides an overview of various techniques that can be used to mitigate Format String vulnerabilities. In addition to the mitigations that are offered by the compilers & operating systems, we will also discuss preventive measures that can be used while writing programs in languages susceptible to Format String vulnerabilities.  Techniques to prevent […]

The post How to mitigate Format String Vulnerabilities appeared first on Infosec Resources.


How to mitigate Format String Vulnerabilities was first posted on September 29, 2020 at 2:46 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
☐ ☆ ✇ InfoSec Resources

How to exploit Format String Vulnerabilities

By Srinivas — September 30th 2020 at 13:28

Introduction In the previous articles, we discussed printing functions, format strings and format string vulnerabilities. This article provides an overview of how Format String vulnerabilities can be exploited. In this article, we will begin by solving a simple challenge to leak a secret from memory. In the next article, we will discuss another example, where […]

The post How to exploit Format String Vulnerabilities appeared first on Infosec Resources.


How to exploit Format String Vulnerabilities was first posted on September 30, 2020 at 8:28 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
☐ ☆ ✇ InfoSec Resources

Format String Vulnerabilities: Use and Definitions

By Srinivas — September 30th 2020 at 15:29

Introduction In the previous article, we understood how print functions like printf work. This article provides further definition of Format String vulnerabilities. We will begin by discussing how Format Strings can be used in an unusual way, which is a starting point to understanding Format String exploits. Next, we will understand what kind of mistakes […]

The post Format String Vulnerabilities: Use and Definitions appeared first on Infosec Resources.


Format String Vulnerabilities: Use and Definitions was first posted on September 30, 2020 at 10:29 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
☐ ☆ ✇ McAfee Blogs

7 Tips to Protect Your Smartphone from Getting Hacked

By Natalie Maxfield — November 1st 2022 at 13:00

There’s little rest for your hard-working smartphone. If you’re like many professionals today, you use it for work, play, and a mix of personal business in between. Now, what if something went wrong with that phone, like loss or theft? Worse yet, what if your smartphone got hacked? Let’s try and keep that from happening to you. 

Globally, plenty of people pull double duty with their smartphones. In Spain, one survey found that 55% of people use the same phone for a mix of personal and and work activity. The same survey showed that up to half of people interviewed in Japan, Australia, and the U.S. do so as well, while nations like the UK and Germany trailed at 31% and 23% respectively. 

Whether these figures trend on the low or high end, the security implications remain constant. A smartphone loaded with business and personal data makes for a desirable target. Hackers target smartphones because they’re often unprotected, which gives hackers an easy “in” to your personal information and to any corporate networks you may use.  It’s like two hacks with one stone.  

Put simply, as a working professional with a smartphone, you’re a high-value target.  

Protect your smartphone from being hacked 

As both a parent and a professional, I put together a few things you can do to protect your smartphone from hacks so that you can keep your personal and work life safe: 

1. Add extra protection with your face, finger, pattern, or PIN. 

First up, the basics. Locking your phone with facial ID, a fingerprint, pattern or a pin is your most basic form of protection, particularly in the event of loss or theft. (Your options will vary depending on the device, operating system, and manufacturer.) Take it a step further for even more protection. Secure the accounts on your phone with strong passwords and use two-factor authentication on the apps that offer it, which doubles your line of defense.    

2. Use a VPN. 

Or, put another way, don’t hop onto public Wi-Fi networks without protection. A VPN masks your connection from hackers allowing you to connect privately when you are on unsecure public networks at airports, cafes, hotels, and the like. With a VPN connection, you’ll know that your sensitive data, documents, and activities you do are protected from snooping, which is definitely a great feeling given the amount of personal and professional business we manage with our smartphones. 

3. Stick to the official app stores for your apps.

Both Google Play and Apple’s App Store have measures in place to help prevent potentially dangerous apps from making it into their stores. Malicious apps are often found outside of the app stores, which can run in the background and compromise your personal data like passwords, credit card numbers, and more—practically everything that you keep on your phone. Further, when you are in the app stores, look closely at the descriptions and reviews for apps before you download them. Malicious apps and counterfeits can still find their way into stores, and here are a few ways you can keep those bad apps from getting onto your phone.    

4. Back up the data on your phone. 

Backing up your phone is always a good idea for two reasons: 

  • First, it makes the process of transitioning to a new phone easy by transferring that backed up data from your old phone to your new phone. 
  • Second, it ensures that your data stays with you if your phone is lost or stolen—allowing you to remotely wipe the data on your lost or stolen phone while still having a secure copy of that data stored in the cloud.  

Both iPhones and Android phones have straightforward ways of backing up your phone regularly. 

5. Learn how to lock or wipe your phone remotely in case of emergency. 

Worst case scenario—your phone is gone. Really gone. Either it’s hopelessly lost or got stolen. What now? Lock it remotely or even wipe its data entirely. While that last bit about wiping the phone seems like a drastic move, if you maintain regular backups as mentioned above, your data is secure in the cloud—ready for you to restore. In all, this means that hackers won’t be able to access you, or your company’s, sensitive information—which can keep you out of trouble and your professional business safe. Apple provides iOS users with a step-by-step guide for remotely wiping devices, and Google offers up a guide for Android users as well. 

6. Get rid of old apps—and update the ones you keep. 

We all download apps, use them once, and then forget they are on our phone. Take a few moments to swipe through your screen and see which ones you’re truly done with and delete them along with their data. Some apps have an account associated with them that may store data off your phone as well. Take the extra step and delete those accounts so any off-phone data is deleted.  

The reason for this is that every extra app is another app that needs updating or that may have a security issue associated with it. In a time of data breaches and vulnerabilities, deleting old apps is a smart move. As for the ones you keep, update them regularly and turn on auto-updates if that’s an option. Updates not only introduce new features to apps, but they also often address security issues too. 

7. Protect your phone. 

With so much of your life on your phone, getting security software installed on it can protect you and the things you keep on your phone. Whether you’re an Android owner or iOS owner, mobile security software can keep your data, your shopping, and payments secure. 

The post 7 Tips to Protect Your Smartphone from Getting Hacked appeared first on McAfee Blog.

☐ ☆ ✇ The first stop for security news | Threatpost

Unpatched DNS Bug Puts Millions of Routers, IoT Devices at Risk

By Elizabeth Montalbano — May 4th 2022 at 10:27
A flaw in all versions of the popular C standard libraries uClibc and uClibc-ng can allow for DNS poisoning attacks against target devices.
☐ ☆ ✇ The first stop for security news | Threatpost

F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems

By Sagar Tiwari — May 5th 2022 at 12:48
The vulnerability is 'critical' with a CVSS severity rating of 9.8 out of 10.
☐ ☆ ✇ The first stop for security news | Threatpost

FBI: Rise in Business Email-based Attacks is a $43B Headache

By Sagar Tiwari — May 9th 2022 at 17:23
A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem.
☐ ☆ ✇ The first stop for security news | Threatpost

Hackers Actively Exploit F5 BIG-IP Bug

By Threatpost — May 10th 2022 at 12:35
The bug has a severe rating of 9.8, public exploits are released.
☐ ☆ ✇ The first stop for security news | Threatpost

Ransomware Deals Deathblow to 157-year-old College

By Nate Nelson — May 11th 2022 at 11:02
Why a private college that stayed in business for 157 years had to close after the combo of COVID-19 and ransomware proved too much.
☐ ☆ ✇ The first stop for security news | Threatpost

Actively Exploited Zero-Day Bug Patched by Microsoft

By Elizabeth Montalbano — May 11th 2022 at 11:12
Microsoft's May Patch Tuesday roundup also included critical fixes for a number of flaws found in infrastructure present in many enterprise and cloud environments.
☐ ☆ ✇ The first stop for security news | Threatpost

Intel Memory Bug Poses Risk for Hundreds of Products

By Sagar Tiwari — May 11th 2022 at 12:27
Dell and HP were among the first to release patches and fixes for the bug.
☐ ☆ ✇ The first stop for security news | Threatpost

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

By Tony Lauro — May 12th 2022 at 11:57
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.
☐ ☆ ✇ The first stop for security news | Threatpost

Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors

By Sagar Tiwari — May 16th 2022 at 11:46
Microsoft's May Patch Tuesday update is triggering authentication errors.
☐ ☆ ✇ The first stop for security news | Threatpost

iPhones Vulnerable to Attack Even When Turned Off

By Elizabeth Montalbano — May 17th 2022 at 13:19
Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
☐ ☆ ✇ The first stop for security news | Threatpost

Sysrv-K Botnet Targets Windows, Linux

By Sagar Tiwari — May 17th 2022 at 13:53
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.
☐ ☆ ✇ The first stop for security news | Threatpost

April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

By Sagar Tiwari — May 18th 2022 at 13:54
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.
☐ ☆ ✇ The first stop for security news | Threatpost

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

By Elizabeth Montalbano — May 19th 2022 at 13:03
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.
☐ ☆ ✇ The first stop for security news | Threatpost

Verizon Report: Ransomware, Human Error Among Top Security Risks

By Elizabeth Montalbano — May 25th 2022 at 12:45
2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur.
☐ ☆ ✇ The first stop for security news | Threatpost

Zoom Patches ‘Zero-Click’ RCE Bug

By Sagar Tiwari — May 25th 2022 at 13:02
The Google Project Zero researcher found a bug in XML parsing on the Zoom client and server.
☐ ☆ ✇ The first stop for security news | Threatpost

Critical Flaws in Popular ICS Platform Can Trigger RCE

By Elizabeth Montalbano — May 27th 2022 at 10:32
Cisco Talos discovered eight vulnerabilities in the Open Automation Software, two of them critical, that pose risk for critical infrastructure networks.
☐ ☆ ✇ Threatpost | The first stop for security news

Zero-Day ‘Follina’ Bug Lays Microsoft Office Open to Attack

By Sagar Tiwari — May 30th 2022 at 14:53
Malware loads itself from remote servers and bypasses Microsoft's Defender AV scanner, according to reports.
☐ ☆ ✇ Threatpost | The first stop for security news

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

By Elizabeth Montalbano — May 31st 2022 at 11:38
The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn.
☐ ☆ ✇ The first stop for security news | Threatpost

Zero-Day ‘Follina’ Bug Lays Microsoft Office Open to Attack

By Sagar Tiwari — May 30th 2022 at 14:53
Malware loads itself from remote servers and bypasses Microsoft's Defender AV scanner, according to reports.
☐ ☆ ✇ The first stop for security news | Threatpost

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

By Elizabeth Montalbano — May 31st 2022 at 11:38
The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn.
☐ ☆ ✇ Threatpost | The first stop for security news

Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack

By Elizabeth Montalbano — June 1st 2022 at 10:38
Threat actors already are exploiting vulnerability, dubbed ‘Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.
☐ ☆ ✇ The first stop for security news | Threatpost

Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack

By Elizabeth Montalbano — June 1st 2022 at 10:38
Threat actors already are exploiting vulnerability, dubbed ‘Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.
☐ ☆ ✇ Threatpost | The first stop for security news

Scammers Target NFT Discord Channel

By Sagar Tiwari — June 2nd 2022 at 11:44
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.
☐ ☆ ✇ The first stop for security news | Threatpost

Scammers Target NFT Discord Channel

By Sagar Tiwari — June 2nd 2022 at 11:44
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.
☐ ☆ ✇ Threatpost | The first stop for security news

Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw

By Elizabeth Montalbano — June 7th 2022 at 11:21
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
☐ ☆ ✇ Threatpost | The first stop for security news

Follina Exploited by State-Sponsored Hackers

By Nate Nelson — June 7th 2022 at 12:45
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.
☐ ☆ ✇ The first stop for security news | Threatpost

Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw

By Elizabeth Montalbano — June 7th 2022 at 11:21
The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario.
☐ ☆ ✇ The first stop for security news | Threatpost

Follina Exploited by State-Sponsored Hackers

By Nate Nelson — June 7th 2022 at 12:45
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.
☐ ☆ ✇ Threatpost | The first stop for security news

China-linked APT Flew Under Radar for Decade

By Nate Nelson — June 17th 2022 at 13:34
Evidence suggests that a just-discovered APT has been active since 2013.
☐ ☆ ✇ The first stop for security news | Threatpost

China-linked APT Flew Under Radar for Decade

By Nate Nelson — June 17th 2022 at 13:34
Evidence suggests that a just-discovered APT has been active since 2013.
☐ ☆ ✇ Threatpost | The first stop for security news

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

By Elizabeth Montalbano — June 22nd 2022 at 12:34
Culture of ‘insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices.
☐ ☆ ✇ The first stop for security news | Threatpost

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

By Elizabeth Montalbano — June 22nd 2022 at 12:34
Culture of ‘insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices.
☐ ☆ ✇ Threatpost | The first stop for security news

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

By Elizabeth Montalbano — June 23rd 2022 at 12:21
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.
☐ ☆ ✇ The first stop for security news | Threatpost

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

By Elizabeth Montalbano — June 23rd 2022 at 12:21
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.
☐ ☆ ✇ Threatpost | The first stop for security news

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

By Sagar Tiwari — June 28th 2022 at 11:57
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
☐ ☆ ✇ Threatpost | The first stop for security news

Mitel VoIP Bug Exploited in Ransomware Attacks

By Sagar Tiwari — June 28th 2022 at 12:42
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
☐ ☆ ✇ The first stop for security news | Threatpost

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

By Sagar Tiwari — June 28th 2022 at 11:57
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
☐ ☆ ✇ The first stop for security news | Threatpost

Mitel VoIP Bug Exploited in Ransomware Attacks

By Sagar Tiwari — June 28th 2022 at 12:42
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
☐ ☆ ✇ Threatpost | The first stop for security news

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

By Sagar Tiwari — June 29th 2022 at 13:00
Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks.
☐ ☆ ✇ The first stop for security news | Threatpost

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

By Sagar Tiwari — June 29th 2022 at 13:00
Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks.
☐ ☆ ✇ Threatpost | The first stop for security news

ZuoRAT Can Take Over Widely Used SOHO Routers

By Elizabeth Montalbano — June 30th 2022 at 17:20
Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
☐ ☆ ✇ The first stop for security news | Threatpost

ZuoRAT Can Take Over Widely Used SOHO Routers

By Elizabeth Montalbano — June 30th 2022 at 17:20
Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
☐ ☆ ✇ Threatpost | The first stop for security news

Google Patches Actively Exploited Chrome Bug

By Elizabeth Montalbano — July 5th 2022 at 11:54
The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code.
☐ ☆ ✇ The first stop for security news | Threatpost

Google Patches Actively Exploited Chrome Bug

By Elizabeth Montalbano — July 5th 2022 at 11:54
The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code.
☐ ☆ ✇ Threatpost | The first stop for security news

Hack Allows Drone Takeover Via ‘ExpressLRS’ Protocol

By Nate Nelson — July 7th 2022 at 11:31
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver.
☐ ☆ ✇ The first stop for security news | Threatpost

Hack Allows Drone Takeover Via ‘ExpressLRS’ Protocol

By Nate Nelson — July 7th 2022 at 11:31
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver.
☐ ☆ ✇ WIRED

New ‘Retbleed’ Attack Can Swipe Key Data From Intel and AMD CPUs

By Dan Goodin, Ars Technica — July 13th 2022 at 16:00
The exploit can leak password information and other sensitive material, but the chipmakers are rolling out mitigations.
☐ ☆ ✇ Threatpost | The first stop for security news

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2

By Threatpost — July 18th 2022 at 12:19
Feds urge U.S. agencies to patch a Microsoft July Patch Tuesday 2022 bug that is being exploited in the wild by August 2.
☐ ☆ ✇ The first stop for security news | Threatpost

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2

By Threatpost — July 18th 2022 at 12:19
Feds urge U.S. agencies to patch a Microsoft July Patch Tuesday 2022 bug that is being exploited in the wild by August 2.
☐ ☆ ✇ Threatpost | The first stop for security news

IoT Botnets Fuels DDoS Attacks – Are You Prepared?

By Sponsored Content — July 26th 2022 at 12:38
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. This is a dangerous warning that the possibility of a sophisticated DDoS attack and a prolonged service outage will prevent businesses from growing.
☐ ☆ ✇ The first stop for security news | Threatpost

IoT Botnets Fuels DDoS Attacks – Are You Prepared?

By Sponsored Content — July 26th 2022 at 12:38
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. This is a dangerous warning that the possibility of a sophisticated DDoS attack and a prolonged service outage will prevent businesses from growing.
☐ ☆ ✇ Threatpost | The first stop for security news

Malicious Npm Packages Tapped Again to Target Discord Users

By Elizabeth Montalbano — July 29th 2022 at 15:07
Recent LofyLife campaign steals tokens and infects client files to monitor various user actions, such as log-ins, password changes and payment methods.
❌