Cybersecurity News
IcedID Shows Obfuscation Sophistication in New Campaign
The malware's developers have turned to dynamic link libraries (DLLs) to hide their work.14 August 2020
DHS CISA Warns of Phishing Emails Rigged with KONNI Malware
Konni is a remote administration tool cyberattackers use to steal files, capture keystrokes, take screenshots, and execute malicious code.14 August 2020
Mac Users Targeted by Spyware Spreading via Xcode Projects

14 August 2020
Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack
R1 RCM Inc. [NASDAQ:RCM], one of the nation's largest medical debt collection companies, has been hit in a ransomware attack.14 August 2020
Critical Flaws in WordPress Quiz Plugin Allow Site Takeover

14 August 2020
Week in security with Tony Anscombe
A deep dive into Mekotio – The financial fallout from data breaches – Fixing election security issues
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
14 August 2020
7 Ways to Keep Your Remote Workforce Safe

14 August 2020
Google will test new feature in Chrome to curb phishing
The web browser will only display domain names as a way to help people recognize impostor websites
The post Google will test new feature in Chrome to curb phishing appeared first on WeLiveSecurity
14 August 2020
WFH Summer 2020 Caption Contest Winners

14 August 2020
Instagram Retained Deleted User Data Despite GDPR Rules

14 August 2020
Mac malware spreads through Xcode projects, abuses WebKit, Data Vault vulnerabilities
XCSSET malware focuses on exploiting Safari and other browsers.14 August 2020
CactusPete hackers go on European rampage with Bisonal backdoor upgrade
The APT is attacking banks and military organizations in Eastern Europe.14 August 2020
A simple telephony honeypot received 1.5 million robocalls across 11 months
Researchers say that most campaigns take place in short-burst storms and that answering a robocall doesn't mean you'll be targeted more often in the future.14 August 2020
Ransomware
Ransomware is a special type of malware. Once it infected your computer, it encrypts all of your files and demands you pay a ransome if you want your files back. Be suspicious of any emails trying to trick you into opening infected attachments or click on malicious links, common sense is your best defense. In addition. backups are often the only way you can recover from ransomware.14 August 2020
NSA, FBI Warn of Linux Malware Used in Espionage Attacks

13 August 2020
CISA Warns of Phishing Campaign with Loan-Relief Lure
Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.13 August 2020
Healthcare Industry Sees Respite From Attacks in First Half of 2020

13 August 2020
Business Email Compromise Attacks Involving MFA Bypass Increase
Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.13 August 2020
CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets

13 August 2020
RedCurl APT Group Hacks Global Companies for Corporate Espionage
Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.13 August 2020