Cybersecurity News
Bazar backdoor linked to Trickbot banking Trojan campaigns
Cybercriminals are taking advantage of the coronavirus pandemic to spread the new malware.16 July 2020
Twitter Elite Accounts Are Hijacked in Unprecedented Cryptocurrency Scam

15 July 2020
Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts
Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.15 July 2020
Chinese state hackers target Hong Kong Catholic Church
EXCLUSIVE: Spear-phishing operation targets members of the Hong Kong Catholic Church.15 July 2020
New Attack Technique Uses Misconfigured Docker API
A new technique builds and deploys an attack on the victim's own system15 July 2020
Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems
A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.15 July 2020
'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall
Cisco issues five critical security patches among a batch of some 31 updates.15 July 2020
Vulns in Open Source EHR Puts Patient Health Data at Risk
Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.15 July 2020
How Nanotechnology Will Disrupt Cybersecurity
Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.15 July 2020
Brazil’s Banking Trojans Go Global

15 July 2020
Microsoft patches critical, wormable flaw in Windows DNS Server
The company urges organizations to waste no time in installing updates to fix the vulnerability that rates a ‘perfect’ 10 on the severity scale
The post Microsoft patches critical, wormable flaw in Windows DNS Server appeared first on WeLiveSecurity
15 July 2020
Firefox on Android: Camera remains active when phone is locked or the user switches apps
Mozilla says it will fix the bug later this year, in October.15 July 2020
Top 5 Questions (and Answers) About GRC Technology
For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain circumstances.15 July 2020
Report: CIA received more offensive hacking powers in 2018
In 2018, US President Trump gave the CIA more powers to carry out covert cyber operations resulting in several hacks and data dumps from Iranian and Russian spy agencies.15 July 2020
Report: CIA most likely behind APT34 and FSB hacks and data dumps
In 2018, US President Trump gave the CIA more powers to carry out covert cyber operations resulting in several hacks and data dumps from Iranian and Russian spy agencies.15 July 2020
Report: CIA behind APT34 and FSB hacks and data dumps
In 2018, US President Trump gave the CIA more powers to carry out covert cyber operations resulting in several hacks and data dumps from Iranian and Russian spy agencies.15 July 2020
The TLS 1.2 Deadline is Looming, Do You Have Your Act Together?

15 July 2020
Stay on the Cutting Edge of Mobile Security
Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.15 July 2020
Details of 142 million MGM hotel guests selling for US$2,900
It appears that the July 2019 breach at MGM Resorts affected far more people than initially thought
The post Details of 142 million MGM hotel guests selling for US$2,900 appeared first on WeLiveSecurity
15 July 2020
Mobile security threats amid COVID‑19 and beyond: A Q&A with Lukas Stefanko
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
The post Mobile security threats amid COVID‑19 and beyond: A Q&A with Lukas Stefanko appeared first on WeLiveSecurity
15 July 2020