Cybersecurity News
Microsoft warns about attacks with the PonyFinal ransomware
PonyFinal infections have been reported in India, Iran, and the US.27 May 2020
Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics
PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.27 May 2020
Critical Android flaw lets attackers hijack almost any app, steal data
Left unpatched, the vulnerability could expose almost all Android users to the risk of having their personal data intercepted by attackers
The post Critical Android flaw lets attackers hijack almost any app, steal data appeared first on WeLiveSecurity
27 May 2020
OpenSSH to deprecate SHA-1 logins due to security risk
Breaking a SHA-1-generated SSH authentication key now costs roughly $50,000, putting high-profile remote servers at risk of attacks.27 May 2020
What the World's Elite Protectors Teach Us about Cybersecurity
How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.27 May 2020
6 Steps Consumers Should Take Following a Hack

27 May 2020
Hackers Sell Data from 26 Million LiveJournal Users on Dark Web

27 May 2020
Virtual Black Hat USA Offers Unparalleled Access to Expert Security Insights
Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.27 May 2020
Netwalker Ransomware Tools Reveal Attacker Tactics and Techniques
Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.27 May 2020
New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD
Eighteen of the 26 bugs impact Linux. Eleven have been patched already.27 May 2020
26 million LiveJournal credentials leaked online, sold on the dark web
LiveJournal credentials were obtained in a 2014 hack, but leaked online earlier this month.26 May 2020
Report: ATM Skimmer Gang Had Protection from Mexican Attorney General’s Office
A group of Romanians operating an ATM company in Mexico and suspected of bribing technicians to install sophisticated Bluetooth-based skimmers in cash machines throughout several top Mexican tourist destinations have enjoyed legal protection from a top anti-corruption official in the Mexican attorney general's office, according to a new complaint filed with the government's internal affairs division.26 May 2020
StrandHogg 2.0 Emerges as 'Evil Twin' to Android Threat
The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor.26 May 2020
Americans Care About Security But Don't Follow Through
Most Americans say they're very concerned about online security but still behave in insecure ways, according to a new survey.26 May 2020
StrandHogg 2.0 Critical Bug Allows Android App Hijacking

26 May 2020
Turla Backdoor Adds Gmail Web Interface for Command-and-Control
The latest version of ComRAT is another sign of the threat actor's continued focus on targets in the government, military, and other sectors.26 May 2020
How to Pay a Ransom: A Step-By-Step Guide for Something You'd Never Do

26 May 2020
How to Pay a Ransom

26 May 2020
Crooks threaten to leak customer data stolen from e‑commerce sites
A hack-and-extort campaign takes aim at poorly secured databases replete with customer information that can be exploited for further attacks
The post Crooks threaten to leak customer data stolen from e‑commerce sites appeared first on WeLiveSecurity
26 May 2020
Benefits of a Cloud-Based, Automated Cyber Range

26 May 2020