Monthly Archives: January 2017

Latest Dridex Trojan variant uses new tactic to bypass Windows UAC

A new variant of the Dridex Trojan recently observed is leveraging a new tactic to bypass the UAC (User Account Control). Researchers at the security firm Flashpoint have discovered a […]

Posted in Cyber Security News | Comments Off on Latest Dridex Trojan variant uses new tactic to bypass Windows UAC

Uber pays $9,000 bug bounty payoff for partner firm’s vulnerability

A security expert discovered a flaw in a ransomware protection service that opened Uber service, and many others, to cyber attacks. The Russian penetration tester Vladimir Ivanov from the security […]

Posted in Cyber Security News | Comments Off on Uber pays $9,000 bug bounty payoff for partner firm’s vulnerability

Sage 2.0 ransomware is spreading and demands a $2,000 ransom

A newly observed spam campaign is spreading a ransomware variant known as Sage 2.0 that is demanding a $2,000 ransom for the decryption key. Sage 2.0 is a new ransomware […]

Posted in Cyber Security News | Comments Off on Sage 2.0 ransomware is spreading and demands a $2,000 ransom

A flaw in the Cisco WebEx Extension allows Remote Code Execution

Tavis Ormandy, a security expert at Google Project Zero, has discovered a critical remote code execution vulnerability in the Cisco WebEx browser extension. Google Project Zero researcher Tavis Ormandy has discovered […]

Posted in Cyber Security News | Comments Off on A flaw in the Cisco WebEx Extension allows Remote Code Execution

Western Union agreed to pay $586 Million to settle fraud charges

The money transfer leader company Western Union has agreed to forfeit $586 million  to settle fraud charges and admitted it facilitated scammers. Money transfer leader company Western Union has admitted to facilitating wire fraud and it has […]

Posted in Cyber Security News | Comments Off on Western Union agreed to pay $586 Million to settle fraud charges

Necurs botnet is back and has started delivering Locky ransomware

Cisco Security Team has noticed traces of traffic from the dormant Necurs botnet and they are warning of a possible new massive ransomware spam campaign. Security researchers at Cisco Security […]

Posted in Cyber Security News | Comments Off on Necurs botnet is back and has started delivering Locky ransomware

The Carbanak gang is with a new modus operandi, Google services as C&C

The infamous Carbanak cybercrime gang is back and is leveraging Google services for command-and-control of its malicious codes. The dreaded Carbanak cybercrime gang is back and is adopting a new tactic for […]

Posted in Cyber Security News | Comments Off on The Carbanak gang is with a new modus operandi, Google services as C&C

How to remain anonymous online

“Someone’s watching you!” – it’s more true today than it’s ever been, when your every movement isn’t being tracked by the millions of CCTV cameras in the UK (even considering […]

Posted in Cyber Security News | Comments Off on How to remain anonymous online

New campaign leverages RIG Exploit kit to deliver the Cerber Ransomware

Experts from Heimdal Security warned of a spike in cyber attacks leveraging the popular RIG Exploit kit to deliver the Cerber Ransomware. The RIG exploit kit is even more popular in the […]

Posted in Cyber Security News | Comments Off on New campaign leverages RIG Exploit kit to deliver the Cerber Ransomware

Shadow Brokers exits releasing another arsenal of tools to hack Windows

The ShadowBrokers hacking group that broke into the NSA arsenal and stole its hacking tools is signing off leaving a gift to the security community. The mysterious hacking group calling […]

Posted in Cyber Security News | Comments Off on Shadow Brokers exits releasing another arsenal of tools to hack Windows

A Second variant of Shamoon 2 targets virtualization products

A second variant of the Shamoon 2 malware was discovered by researchers at Palo Alto Networks, this threat also targets virtualization products. A new strain of the Shamoon 2 malware was spotted […]

Posted in Cyber Security News | Comments Off on A Second variant of Shamoon 2 targets virtualization products

ESEA data breach, 1.5 million gamers’ records leaked

The E-Sports Entertainment Association (ESEA), one of the largest competitive video gaming communities was hacked, 1.5 million players have been affected. Bad news for gamers, the E-Sports Entertainment Association (ESEA), […]

Posted in Cyber Security News | Comments Off on ESEA data breach, 1.5 million gamers’ records leaked

Yahoo! Data Breach Didn’t Need to Happen…Here’s Why…

I remember meeting Tim Koogle in one of the ‘ten plague’ conference rooms in the early days of Yahoo! Tim was the founding CEO at the time. I thought it […]

Posted in Cyber Security News, Featured | Comments Off on Yahoo! Data Breach Didn’t Need to Happen…Here’s Why…

French Defense Minister Le Drian warns of cyber attacks during upcoming elections

Defense Minister Le Drian comments expressed concerns about cyber attacks against defense systems and warns of hacking campaigns on the upcoming elections. According to the Defence Minister Jean-Yves Le Drian […]

Posted in Cyber Security News | Comments Off on French Defense Minister Le Drian warns of cyber attacks during upcoming elections

Hacker held open MongoDB databases for ransom

A mysterious hacker is breaking into unprotected MongoDB databases, stealing their content, and asking for a ransom to return the data. Co-founder of the GDI Foundation Victor Gevers is warning of poor […]

Posted in Cyber Security News | Comments Off on Hacker held open MongoDB databases for ransom

Changing travelers flight bookings is way too easy for hackers

Changing travelers flight bookings is too easy. Absolutely astounding the Karsten Nohl research on the insecurity of traveler flight information. The current travel booking systems is deeply insecure, it lacks […]

Posted in Cyber Security News | Comments Off on Changing travelers flight bookings is way too easy for hackers

New variant of the Sundown exploit kit leverages steganography to hide malicious code

A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security experts from Trend Micro have spotted a new version of […]

Posted in Cyber Security News | Comments Off on New variant of the Sundown exploit kit leverages steganography to hide malicious code

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X