Microsoft Addresses Zero-Day Vulnerability Ahead of Patch Tuesday
Due to its highly critical nature, a zero-day vulnerability (CVE-2017-0290) that exploits Microsoft Malware Protection Engine (MsMpEng) was addressed by the company in an out-of-band security update just before May’s patch Tuesday. Discovered and disclosed to Microsoft by Google Project Zero’s Natalie Silvanovich and Tavis Ormandy, this vulnerability allows attackers full access to a user’s […] more…When phone systems attack
A telephony denial of service (TDoS) attack is a specific type of DDoS attack that originates from or is directed towards a telephone system with the intent of bringing down the targeted system. These attacks commonly focus on commercial businesses and may often include ransomware requests. In reality, these attacks can affect anyone, including our nation’s […] more…Lazarus Under The Hood
Download full report (PDF) In February 2017 an article in the Polish media broke the silence on a long-running story about attacks on banks, allegedly related to the notoriously known Lazarus Group. While the original article didn’t mention Lazarus Group it was quickly picked up by security researchers. Today we’d like to share some of […] more…Are Printers Becoming Yet Another IoT-Based Threat?
Over the past couple of months, a lot has been written about the Mirai botnet that was targeting vulnerable devices connected to the Internet. And based on the embedded password list, we can determine that the targets were diverse– from IP-camera’s, DVR’s, TV receivers, routers to printers. Printers? Yes, printers. Over the years, these devices […] more…Confidence in McAfee Endpoint Security Drives Widespread Adoption Across Australian School System
The 103 Catholic schools overseen by Catholic Education South Australia (CESA) can use whichever endpoint security they choose. They have the option to purchase endpoint protection at a per-user or per-node cost from a CESA team that designs and delivers school-centric technology services. But they are also free to turn to other solutions. In the […] more…RATANKBA: Delving into Large-scale Watering Holes against Enterprises
In early February, several financial organizations reported malware infection on their workstations, apparently coming from legitimate websites. The attacks turned out to be part of a large-scale campaign to compromise trusted websites in order to infect the systems of targeted enterprises across various industries. The strategy is typically known as a “watering hole” attack. It […] more…Lurk: Retracing the Group’s Five-Year Campaign
by Fyodor Yarochkin and Vladimir Kropotov (Senior Threat Researchers) Fileless infections are exactly what their namesake says: they’re infections that don’t involve malicious files being downloaded or written to the system’s disk. While fileless infections are not necessarily new or rare, it presents a serious threat to enterprises and end users given its capability to […] more…Updated Sundown Exploit Kit Uses Steganography
This year has seen a big shift in the exploit kit landscape, with many of the bigger players unexpectedly dropping out of action. The Nuclear exploit kit operations started dwindling in May, Angler disappeared around the same time Russia’s Federal Security Service made nearly 50 arrests last June, and then in September Neutrino reportedly went […] more…Switcher: Android joins the ‘attack-the-router’ club
Recently, in our never-ending quest to protect the world from malware, we found a misbehaving Android trojan. Although malware targeting the Android OS stopped being a novelty quite some time ago, this trojan is quite unique. Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, […] more…Home Routers: Mitigating Attacks that can Turn them to Zombies
by Kevin Y. Huang, Fernando Mercês and Lion Gu With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same. Based on […] more…Je li vrijeme da vaša djeca postanu svjesna digitalnih prijevara?
Davno sam gledala film u kojem se glavni junak vratio kući nakon strašnog iskustva i otkrio da je varalica zauzeo njegovo mjesto! Prisvojio je njegovo ime, njegove dokumente pa čak i njegov posao! Junak je prošao kroz teško razdoblje dok je dokazivao svoju vjerodostojnost i objašnjavao svijetu da je njegov dvojnik počinio prijevaru. U rječniku […] more…Uznemiravanje na društvenim mrežama stvarna je prijetnja. Evo kako se zaštititi.
Gotovo je apsolutna istina da pristup plaštu anonimnosti i velikom mikrofonu izvlači ono najgore iz nekih osoba. Danas to posebice vrijedi za društvene mreže. Uznemiravanje na mreži i poruke pune mržnje sve su veći trend i sve veći sigurnosni problem za svakoga tko danas upotrebljava društvene mreže. Zapravo, 40 % korisnika interneta kaže da su […] more…Softver za iznuđivanje otkupnine i vi
Prošloga sam vikenda bio na lokalnom klizalištu gdje su moja djeca uživala u svom prvom klizanju. Dok sam gledao kako moje najstarije dijete radi uspješan krug po klizalištu, prišao mi je jedan od ostalih roditelja i pitao: „Hej, vaš je posao povezan sa sigurnošću, kakva je to priča o softveru za iznuđivanje otkupnine? Trebam li […] more…Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched
by Feike Hacquebord and Stephen Hilt The effectiveness of a zero-day quickly deteriorates as an attack tool after it gets discovered and patched by the affected software vendors. Within the time between the discovery of the vulnerability and the release of the fix, a bad actor might try to get the most out of his previously […] more…Disassembling a Mobile Trojan Attack
In early August we detected several cases of a banking Trojan being downloaded automatically when users viewed certain news sites on their Android devices. Later it became apparent that this was being caused by advertising messages from the Google AdSense network, and was not restricted to news sites. In fact, any site using AdSense to […] more…How an Online Prank Had Countless Phones Dialing 911
Remember elementary school, when prank notes left on fellow students’ desks caused uproars of laughter? Those were golden days. Consequences were intangible — coming just from adults to (seemingly) steal the fun. But of course, as we grow older, the first taste of reality is harsh. In recent cybersecurity news, that’s exactly what hit […] more…More information
- FBI Chief Sees Better Cyber Cooperation From China
- Apple aims for certainty, not hallucinations, in AI
- Penn State Worthington Scranton Voice Services Migration
- Attackers Abuse Kubernetes RBAC to Deploy Persistent Backdoor
- SSCC 119 – Happy 10th, Patch Tuesday – Adobe “goes open source” – Dread Pirate Roberts [PODCAST]
- Anti-Fraud Bot Protection Firm Kasada Bags $23 Million Investment
- Hackers Collecting Intelligence on Potential Opponents to Iranian Regime
- Outage: Office 365 SafeLinks may be partially unavailable
- Facebook Says Chinese Phone Makers Got Access to Data
- Another Facebook hoax: Robbers still throwing eggs at car windows?