Malicious JavaScript Used in WP Site/Home URL Redirects
Our team recently found a malicious JavaScript injection within the WordPress index.php theme file on a compromised WordPress website which ultimately redirects site visitors to a survey-for-gifts scam website. At this time of writing, we have seen over two thousand new infected sites since we started tracking this infection. The injection seen below is used […] more…Data Security Startup Cyral Emerges From Stealth Mode
California-based data security startup Cyral emerged from stealth mode this week and announced that it has raised $11 million in a Series A funding round. The company previously received $4.1 million in an angel investment round, which brings the total raised to date to over $15 million. read more more…Kadena launches Chainweb, a hybrid platform to connect public, private blockchains
Brooklyn-based startup Kadena has launched a hybrid blockchain that can scale horizontally, enabling multiple electronic ledgers to talk to each other via smart contracts – and letting users transfer cryptocurrency between the chains. Hybrid blockchains combine permissioned chains for businesses to transact in the background while connecting to a public blockchain (via an API) for consumers and […] more…January Patch Tuesday: Update List Includes Fixes for Internet Explorer, Remote Desktop, Cryptographic Bugs
2020 starts off with a relatively heavy list of patches for Microsoft users. January is typically a light month for fixes, but Microsoft released patches for 49 vulnerabilities (eight of which are Critical and all the remaining classified as Important) in this cycle. None of these vulnerabilities are known to be under attack at this […] more…Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink and rebuild your relationship with technology? If so, embracing digital minimalism may be the most powerful way to achieve that goal. We learned last week in our first post on this series tht digital minimalism […] more…Hackers Scan for Vulnerable Citrix ADC Systems
Weeks after Citrix revealed a critical vulnerability impacting its Application Delivery Controller (ADC) and Gateway products, hackers have started to scan the Internet for vulnerable systems, security researchers report. read more more…Digital Minimalism: Is It Time to Overhaul Your Relationship with Technology?
Editor’s Note: This is part I of a series on Digital Minimalism in 2020. When Steve Jobs introduced the iPhone in 2007, he called it the “best iPod ever,” and said it would be a “very cool way” to make calls and listen to music. Little did he know that it would be the catalyst […] more…ProtonMail Launches Encrypted Calendar Application
ProtonMail has released the beta version of ProtonCalendar, its fully encrypted calendar application that aims to help users both keep track of their plans and keep their data private. Built with end-to-end encryption right from the start, the app can secure and protect users’ sensitive events-related information, ProtonMail says. read more more…How to get started with HomeKit home automation
How to get started with HomeKit home automation l33tdawg Tue, 12/31/2019 – 00:54 more…7 types of virus – a short glossary of contemporary cyberbadness
Here’s a short list of 7 malware categories we hope you never encounter. Sadly, it’s not an exhaustive list… but it’s a helpful start. more…Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks — such as notifying us who’s at the front door or providing us home surveillance at the touch of a button. And though these devices are helpful, they also provide cybercriminals with a way to enter […] more…Plundervolt – stealing secrets by starving your computer of voltage
Turns out that if you drop your CPU voltage just enough, it makes mistakes that could let you sneak in where you shouldn’t. more…(Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing
By Arianne Dela Cruz, Jay Nebre and Augusto Remillano II As the value of cryptocurrencies increased (after a short dip in 2018), we observed increased activity from cryptocurrency mining malware this year, particularly infections and routines involving Monero miners. Over a span of a few months, we came across an infection routine that exploited vulnerabilities […] more…Waterbear is Back, Uses API Hooking to Evade Security Product Detection
By Vickie Su, Anita Hsieh, and Dove Chiu Waterbear, which has been around for several years, is a campaign that uses modular malware capable of including additional functions remotely. It is associated with the cyberespionage group BlackTech, which mainly targets technology companies and government agencies in East Asia (specifically Taiwan, and in some instances, Japan […] more…You can order the Mac Pro and Pro Display XDR starting tomorrow
You can order the Mac Pro and Pro Display XDR starting tomorrow l33tdawg Tue, 12/10/2019 – 00:45 more…How hackers stole $1 million fund meant for Israeli startup
How hackers stole $1 million fund meant for Israeli startup l33tdawg Mon, 12/09/2019 – 02:03 more…More information
- Cloud Security Firm Valtix Emerges From Stealth With $14 Million in Funding
- Vulnerability Exposes F5 BIG-IP Systems to Remote DoS Attacks
- Mobilisafe debuts with mobile risk-management software
- Stalking victim’s petition to LinkedIn for blocking feature is finally heard
- ‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library
- New York is trying to force backdoors into phones with legislation
- Hijacking of AV firms’ websites may be linked to hack on Network Solutions
- Encrypted WhatsApp messages frustrate new court-ordered wiretap
- Lazarus Group Targets Linux With New Malware
- Taxpayers shrug off ID fraud warnings even as attacks rise