DDoS attacks in Q1 2020
News overview Since the beginning of 2020, due to the COVID-2019 pandemic, life has shifted almost entirely to the Web — people worldwide are now working, studying, shopping, and having fun online like never before. This is reflected in the goals of recent DDoS attacks, with the most targeted resources in Q1 being websites of […] more…School From Home: Project-Based Learning
School from Home: Project-Based Learning If keeping your kids on task and engaged with schoolwork from home is proving to be a challenge, you aren’t alone. We recently surveyed families and found that keeping kids focused was at the top of parent concerns right alongside establishing a routine. Just as school-aged kids can often struggle […] more…Remote spring: the rise of RDP bruteforce attacks
With the spread of COVID-19, organizations worldwide have introduced remote working, which is having a direct impact on cybersecurity and the threat landscape. Alongside the higher volume of corporate traffic, the use of third-party services for data exchange, and employees working on home computers (and potentially insecure Wi-Fi networks), another headache for infosec teams is […] more…Connect With Confidence: Benefits of Using a Personal VPN
Protect your digital life The recent surge in work from home is likely accompanied by a corresponding increase in corporate VPN (virtual private network) usage. More and more employees who would typically be connected at the office are using these protected networks to access confidential documents and sites. To some, these corporate VPNs are simply a tunnel into their work lives. But what about the benefits of a personal VPN? What is a VPN […] more…School #FromHome: Bring Structure to Your Day
School #FromHome: Bring Structure to Your Day Whether you’re a few weeks into a school closure or going on a few months now, you’re no doubt helping your school-aged children—and even your college kids—settle into a new routine that involves learning from home. Needless to say, it’s an adjustment for everyone as you and […] more…Exposing Modular Adware: How DealPly, IsErIk, and ManageX Persist in Systems
By RonJay Caragay, Fe Cureg, Ian Lagrazon, Erika Mendoza, and Jay Yaneza (Threats Analysts) Adware isn’t new and they don’t spark much interest. A lot of them are overlooked and underestimated because they’re not supposed to cause harm — as its name suggests, adware is advertising-supported software. However, we have constantly observed suspicious activities caused […] more…Unkillable xHelper and a Trojan matryoshka
It was the middle of last year that we detected the start of mass attacks by the xHelper Trojan on Android smartphones, but even now the malware remains as active as ever. The main feature of xHelper is entrenchment — once it gets into the phone, it somehow remains there even after the user deletes […] more…Internet Safety for Kids: A Refresher for Homebound Families
Editor’s Note: This is part II of our internet safety for kids series. Part I focuses on younger children and can be read here. Parents have always been concerned about keeping their kids safe online — especially their tweens and teens. That conversation is even more critical with parents and kids now working and learning […] more…How Humans "LEAD" the Way to More Effective Use of Threat Intelligence
When the theme, Human Element, was announced for RSA Conference 2020 (RSAC), I was gratified. It’s a topic I never tire of because not only do I believe that there is no “silver bullet” technology, I believe it’s the humans who really lead the way to greater security efficiency and effectiveness. read more more…More Than 8,000 Unsecured Redis Instances Found in the Cloud
By David Fiser (Security Researcher) We discovered 8,000 Redis instances that are running unsecured in different parts of the world, even ones deployed in public clouds. These Redis instances have been found without Transport Layer Security (TLS) encryption and are not password protected. Redis, according to its developers, is originally intended to be used only […] more…Don’t Be an April Fool – Protect Your Digital Assets
Be Part of World Back Up Data Day on 31st March There are not many worse feelings that the realisation that a document you’ve worked tirelessly on has vanished! We’ve all been there and it’s not nice at all. Whether you break into a sweat, scream or even say a word you shouldn’t – losing […] more…Two Dozen Arrested for Laundering Funds From BEC, Other Scams
Twenty-four individuals were arrested for laundering funds illegally obtained via business email compromise (BEC), romance, and retirement account scams targeting victims across the United States. The large-scale fraud operation facilitated by the arrested individuals has caused losses of more than $30 million, the Department of Justice has revealed. read more more…MonitorMinor: vicious stalkerware
The other day, our Android traps ensnared an interesting specimen of stalkerware — commercial software that is usually used to secretly monitor family members or colleagues. On closer inspection, we found that this app outstrips all existing software of its class in terms of functionality. Let’s take a look one step at a time. Modern […] more…MonitorMinor: vicious stalkerware?
Updated March 17th, 2020 The other day, our Android traps ensnared an interesting specimen of commercial software that is positioned as a parental control app, but may also be used to secretly monitor family members or colleagues – or, in other words, for stalking. Such apps are often called stalkerware. On closer inspection, we found […] more…Busting Ghostcat: An Analysis of the Apache Tomcat Vulnerability (CVE-2020-1938 and CNVD-2020-10487)
by: Magno Logan (Information Security Specialist) Discussions surrounding the Ghostcat vulnerability (CVE-2020-1938 and CNVD-2020-10487) found in Apache Tomcat puts it in the spotlight as researchers looked into its security impact, specifically its potential use for remote code execution (RCE). Apache Tomcat is a popular open-source Java servlet container, so the discovery of Ghostcat understandably set […] more…Security Risks in Online Coding Platforms
By David Fiser (Senior Cyber Threat Researcher) Threat Modeling for Online Coding Platforms Before cloud integrated development environments (IDEs) became an option, you, i.e., the developer, typically need to download and/or install everything you need onto your own workstations. However, as DevOps gained traction and cloud computing usage grew, you can now also code online. […] more…More information
- New Windows Process Injection Can Be Useful for Stealthy Malware
- Most in-demand skills for 2023, according to LinkedIn
- Android Apps Expose Sensitive Data Due to Misconfigured Third-Party Services
- Traffic to Major Tech Firms Rerouted to Russia
- ICANN: data breaches not due to new top-level domains
- Twitter Housekeeping: Clean up Your Third-Party Access
- Private Prison Operator GEO Group Discloses Data Breach
- Google Launches Strong Encryption for Android Messages
- Backslash Raises $19 Million to Secure Vibe Coding
- A Simple Backup Solution