May 19, 2020
Multiple vulnerabilities in Nitro Pro PDF reader

Aleksandar Nikolic and Cory Duplantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered two code execution vulnerabilities and an information disclosure flaw in Nitro Pro PDF reader. Nitro PDF allows users to save, read, sign and edit PDFs on their computers. The software contains vulnerabilities that could allow adversaries […]

Read More
May 19, 2020
Adwind trojan targets India's co-operative banks

PUNE: Seqrite, the enterprise security arm of Quick Heal Technologies, said that it had detected a new wave of Adwind Java Remote Access Trojan (RAT) campaign targeting Indian co-operative banks using Covid-19 as a bait. Researchers at Seqrite warned that if attackers are successful, they can take over the victim’s device to steal sensitive data […]

Read More
May 19, 2020
Cyberattackers Targeting Supercomputers - British Supercomputer ARCHER Exploited

Britain's most powerful academic supercomputer, ARCHER, has fallen victim to a cryptojacking attack, causing a wave of anxiety among other supercomputer operators across the globe. What happened ARCHER, one of the most powerful computers in the world, was exploited via a cyberattack. On May 11, 2020, a security incident had been detected at the British […]

Read More
May 19, 2020
Water Utilities Face Increasing Risk of Cyberattacks

Organizations related to water treatment plants and water supply agencies are a critical part of the public infrastructure. Although cyberattacks on water facilities have not grabbed headlines nearly as much as other public utilities, their failure may have an impact as severe as the failure of a national power grid. A recent failed attack on […]

Read More
May 19, 2020
Aggah Campaign Leverages Freely Available Infrastructure to Distribute Multiple RATs

The Aggah campaign has been quite prolific recently and the attackers have used publicly available infrastructure such as Bit.ly, BlogSpot, and Pastebin to direct and host their infection components. Malicious infection chain and variations of the final payloads The “Aggah” infection chain has been observed distributing a variety of final payloads, varying from ransomware to […]

Read More
May 19, 2020
Latest Cyber Threats Looming Over IoT Devices

Kaiji, a new strain of malware that is created from scratch using the Golang programming language, has been infecting Linux-based servers and Internet of Things (IoT) devices to launch distributed denial-of-service (DDoS) attacks. IoT devices targeted by malware attacks IoT devices have been a regular target of several malware operators. In May 2020, Kaiji botnet […]

Read More
May 19, 2020
Implementing A Layered Approach To Phishing And Whaling

During this digital summit panel, Suresh Chawdhary, head of security & privacy for Nokia, stresses the importance of a layered, multi-pronged cyber security approach to best protect from phishing and whaling. This layer defense mechanism moves away from a one-size-fits-all strategy, ensuring that everyone across the enterprise is well equipped to stay protected against threats. […]

Read More
May 19, 2020
Ordering Food Online? Cyberattackers May be Watching You

During the COVID-19 viral pandemic, all online businesses are facing a spike in cyberthreats. The online food delivery services and restaurant chains that are still offering online booking and home delivery services, also face cybersecurity-related concerns, as suggested by a recent April 2020 report. Recent cyberattacks on food delivery services Cybercriminals have been actively targeting […]

Read More
May 18, 2020
Likely Breach Shuts Down Arkansas Unemployment Program

A state program that was created to process unemployment applications in Arkansas for self-employed individuals or gig economy workers appears to have been illegally accessed and has been shut down, officials announced Saturday. Gov. Asa Hutchinson said he learned Friday evening that an applicant for the program is believed to have somehow accessed the system, […]

Read More
May 18, 2020
Law firm targeted by hackers says Trump was never a client

The celebrity law firm targeted by a hacking group with a $42 million ransom demand said Sunday that it had no previous relationship with President TrumpDonald John TrumpTrump tears into '60 Minutes' after segment with whistleblower Bright James Woods defends Trump: He 'loves America more than any president in my lifetime' Kansas governor to meet […]

Read More
May 16, 2020
Federal watchdog finds chemical facilities vulnerable to cyberattacks

Chemical facilities are vulnerable to crippling cyberattacks due to outdated government cybersecurity guidance, the Government Accountability Office (GAO) concluded in a report released this week. The report released Thursday found that the Department of Homeland Security (DHS), which oversees the security of “high-risk” chemical facilities through the Chemical Facilities Anti-Terrorism Standards program, hasn't updated cybersecurity […]

Read More
May 16, 2020
WordPress malware finds WooCommerce sites for Magecart attacks

Image: Erik Mclean Researchers at website security firm Sucuri have discovered a new WordPress malware used by threat actors to scan for and identify WooCommerce online shops with a lot of customers to be targeted in future Magecart attacks. WooCommerce is an open-source WordPress plugin with over 5 million active installs and designed to make it easy to run e-commerce sites […]

Read More
1 59 60 61 62 63 73
PORTFOLIOHOW IT WORKSPRICINGABOUTCONTACT