SoakSoak: Payload Analysis – Evolution of Compromised Sites – IE 11
Thousands of WordPress sites have been hit by the SoakSoak attack lately. At this moment we know quite a lot about it; it uses the RevSlider vulnerability as a point of penetration, then uploads a backdoor and infects all websites that share the same server account. This means websites that don’t use the RevSlider plugin […] more…Resolved: VM Hosting Slowness
The small percentage of the VMs that were responding slowly this morning are now functioning at full speed. Below is more information about the degradation that occurred: When was the degradation resolved? The degradation was resolved by 12:30 p.m. this afternoon, returning all VMs to normal operating state. What caused the degradation to occur? This […] more…Insider Threats 101: The Threat Within
Recent events – both in the United States and in Japan – have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of their very nature, it can be difficult to handle these problems, particularly because the mindset needed to handle them can vary. The insider threat can be broken down into three […] more…The 5 worst big data privacy risks (and how to guard against them)
The collection and manipulation of Big Data, as its proponents have been saying for several years now, can result in real-world benefits: Advertisements focused on what you actually want to buy; smart cars that can call for an ambulance if you’re in an accident; wearable or implantable devices that can monitor your health and notify […] more…Security Advisory – High Severity– WordPress Download Manager
Advisory for: WordPress Download Manager Security Risk: Very High Exploitation level: Easy/Remote DREAD Score: 9/10 Vulnerability: Code Execution / Remote File Inclusion Risk Version: <2.7.4 If you’re using the popular WP Download Manager plugin (around 850,000 downloads), you should update right away. During a routine audit for our Website Firewall (WAF), we found a dangerous […] more…JoomDonation Compromised
We are receiving reports from many users of the popular JoomDonation platform that they received a very scary email from someone that supposedly hacked into JoomDonation. The emails went to the registered accounts and contained the full names, so it looks like JoomDonation did in fact get breached. This is the full email: How the […] more…State of Play: Network Devices Facing Bulls-eye
A long time has passed since we published our analysis of threats for home network devices. Since then, the situation has significantly changed – alas, not for the better. Back in 2011, we were concerned mainly about the security of SOHO routers, DSL modems and wifi access points. Today, we are talking about the whole […] more…Guidelines for securing your home
Our homes today look more like small offices. We have tons of different devices connected to our network, everything from storage devices and network equipment to wireless network printers. The entire “home entertainment” industry is getting connected: it is very difficult to buy a TV, DVD or Blu-ray player that’s does not have WIFI… the […] more…NotCompable sets new standards for mobile botnet sophistication
The NotCompatible mobile malware has reached a new level of sophistication, according to a new report from San Francisco-based mobile security company Lookout, Inc. The malware was first detected in 2012, but the newly discovered variant, NotCompatible.C, is the most complex mobile malware the company has ever seen. NotCompatible’s writers have rebuilt the entire back […] more…Good App/Bad App: Is Investigating Mobile Apps Necessary?
These days, when you see someone staring intently or tapping at their mobile phones, chances are that they’re busy with an app. This comes as no surprise as 80% of consumers’ time on mobile devices apps is spent in apps for gaming, news, productivity, utility, social networking, and more. Apps and Risky Taps We are currently […] more…This is how Google is dealing with ‘right to be forgotten’ requests
Google is employing a big team of lawyers, engineers and paralegals who have so far evaluated over half a million URLs that were requested to be delisted from search results by European citizens, the company said. About six months after the Court of Justice of the European Union (CJEU) gave Europeans the right to compel […] more…A Peek Inside a PoS Scammer’s Toolbox
PoS malware has been receiving a tremendous amount of attention in the past two years with high profile incidents like Target, Home Depot, and Kmart. With the massive “Black Friday” shopping season coming up, PoS malware will surely get additional publicity. This high profile nature means, we constantly look for evolving PoS malware and look into their behavior […] more…Microsoft: Competing AV vendors need to remember who the bad guys are
AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday. Data sharing between vendors has resulted in a drop in the overall number of malware families affecting computers, said Dennis Batchelder, director of the Microsoft Malware Protection Center, at a conference of […] more…The Art of Website Malware Removal – The Basics
When talking about defense against malicious hacks, the attack vector is a common topic for Information Security (InfoSec) professionals. The primary concern is to understand the anatomy of the attack and prevent it from happening again. However, there is a less glamorous task that must take place once an attack vector is exploited; that is […] more…Tracking Activity in the Chinese Mobile Underground
We first lifted the veil on activities in the Chinese cybercriminal underground in 2012. Since then, we have continually reported about notable changes or activity found in this black market. A few months ago, we noted that the Chinese underground has continued to grow, as the cost of connectivity and hardware continues to fall, and […] more…Law Enforcement Agencies in Tor: Impact Over the Dark Web
The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week. Tor-related communities, such as privacy enthusiasts, but also cybercriminals (of course!), expressed worry after a global law enforcement operation targeted a number of illegal services based on Tor. Operation Onymous, coordinated by Europol’s European Cybercrime […] more…More information
- Why You Lost Your Windows 10 Product Key
- The Biggest Security Threats Coming in 2017
- MoonBounce Malware Can Survive OS Reinstalls
- ‘Frankenstein’ virus could assemble itself from app snippets
- Resolved: Library service interruption, January 9, 2013
- Check Point Partners With SCADAfence to Protect OT Networks
- Edward Snowden had a ‘crypto party’ before he blew his NSA whistle
- New Research Links VPN Apps, Highlights Security Deficiencies
- Shields Up: How to Minimize Ransomware Exposure
- WhatsApp phishing – how it works, and what to do [VIDEO]