Cybersecurity News


How to Pinpoint Rogue IoT Devices on Your Network

Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.
12 October 2020

Ransomware Attackers Buy Network Access in Cyberattack Shortcut

Ransomware Attackers Buy Network Access in Cyberattack Shortcut Network access to various industries is being offered in underground forums at as little as $300 a pop - and researchers warn that ransomware groups like Maze and NetWalker could be buying in.
12 October 2020

Ransomware operators now outsource network access exploits to speed up attacks

The trend is on the rise as ransomware continues to be lucrative -- especially in the enterprise space.
12 October 2020

Microsoft Uses Trademark Law to Disrupt Trickbot Botnet

Microsoft Corp. has executed a coordinated legal sneak attack in a bid to disrupt the malware-as-a-service botnet Trickbot, a global menace that has infected millions of computers and is used to spread ransomware. A court in Virginia granted Microsoft control over many Internet servers Trickbot uses to plunder infected systems, based on novel claims that the crime machine abused the software giant's trademarks. However, it appears the operation has not completely disabled the botnet.
12 October 2020

Microsoft and others orchestrate takedown of TrickBot botnet

FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, Symantec, and the Microsoft Defender team participated in the takedown.
12 October 2020

ESET takes part in global operation to disrupt Trickbot

Throughout its monitoring, ESET analyzed thousands of malicious samples every month to help this effort

The post ESET takes part in global operation to disrupt Trickbot appeared first on WeLiveSecurity

12 October 2020

Twitter slaps warning on President Trump tweet claiming coronavirus immunity

Trump has claimed immunity to the virus, despite no scientific backing.
12 October 2020

Hacker groups chain VPN and Windows bugs to attack US government networks

Some attacks were successful and intruders gained "unauthorized access to elections support systems."
12 October 2020

Five Eyes governments, India, and Japan make new call for encryption backdoors

Another Five Eyes meeting, another call for encryption backdoors in modern tech.
11 October 2020

Proud Boys websites kicked off web host, Google Cloud

Following years of lobbying efforts, Google intervenes with one of its customers to have Proud Boys websites moved off its platform.
10 October 2020

Children and parent info exposed in Georgia DHS data breach

The personal and health data of children and adults involved in Child Protective Services cases was exposed.
10 October 2020

New self-erasing chip could be used to detect counterfeit or tampered products

Special chips holding messages can be placed inside products. When the chip is exposed to natural light, the message disappears.
10 October 2020

Report: U.S. Cyber Command Behind Trickbot Tricks

A week ago, KrebsOnSecurity broke the news that someone was attempting to disrupt the Trickbot botnet, a malware crime machine that has infected millions of computers and is often used to spread ransomware. A new report Friday says the coordinated attack was part of an operation carried out by the U.S. military's Cyber Command.
10 October 2020

Document-signing service Docsketch discloses security breach

Docsketch says an unauthorized third-party accessed a three-week old copy of its database.
09 October 2020

Latest Version of MalLocker Android Ransomware Packs New Tricks

Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.
09 October 2020

Apple Pays Bug Bounty to Enterprise Network Researchers

So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.
09 October 2020

Fitbit Spyware Steals Personal Data via Watch Face

Fitbit Spyware Steals Personal Data via Watch Face Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face.
09 October 2020

Critical Zerologon Flaw Exploited in TA505 Attacks

Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.
09 October 2020

Sophisticated Android Ransomware Executes with the Home Button

Sophisticated Android Ransomware Executes with the Home Button The malware also has a unique machine-learning module.
09 October 2020

CISOs Planning on Bigger Budgets: Report

Budgets are on the rise, even in a time of revenue worries across the industry.
09 October 2020