Cybersecurity News


Microsoft warns about attacks with the PonyFinal ransomware

PonyFinal infections have been reported in India, Iran, and the US.
27 May 2020

Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics

PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.
27 May 2020

Critical Android flaw lets attackers hijack almost any app, steal data

Left unpatched, the vulnerability could expose almost all Android users to the risk of having their personal data intercepted by attackers

The post Critical Android flaw lets attackers hijack almost any app, steal data appeared first on WeLiveSecurity

27 May 2020

OpenSSH to deprecate SHA-1 logins due to security risk

Breaking a SHA-1-generated SSH authentication key now costs roughly $50,000, putting high-profile remote servers at risk of attacks.
27 May 2020

What the World's Elite Protectors Teach Us about Cybersecurity

How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.
27 May 2020

6 Steps Consumers Should Take Following a Hack

6 Steps Consumers Should Take Following a Hack Without the luxury of an IT security team to help them after a breach or credit card compromise, consumers will want to keep these tips in mind.
27 May 2020

Hackers Sell Data from 26 Million LiveJournal Users on Dark Web

Hackers Sell Data from 26 Million LiveJournal Users on Dark Web Passwords and other credentials have been listed on Have I Been Pwned as attack rumors circulate.
27 May 2020

Virtual Black Hat USA Offers Unparalleled Access to Expert Security Insights

Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.
27 May 2020

Netwalker Ransomware Tools Reveal Attacker Tactics and Techniques

Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.
27 May 2020

New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD

Eighteen of the 26 bugs impact Linux. Eleven have been patched already.
27 May 2020

26 million LiveJournal credentials leaked online, sold on the dark web

LiveJournal credentials were obtained in a 2014 hack, but leaked online earlier this month.
26 May 2020

Report: ATM Skimmer Gang Had Protection from Mexican Attorney General’s Office

A group of Romanians operating an ATM company in Mexico and suspected of bribing technicians to install sophisticated Bluetooth-based skimmers in cash machines throughout several top Mexican tourist destinations have enjoyed legal protection from a top anti-corruption official in the Mexican attorney general's office, according to a new complaint filed with the government's internal affairs division.
26 May 2020

StrandHogg 2.0 Emerges as 'Evil Twin' to Android Threat

The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor.
26 May 2020

Americans Care About Security But Don't Follow Through

Most Americans say they're very concerned about online security but still behave in insecure ways, according to a new survey.
26 May 2020

StrandHogg 2.0 Critical Bug Allows Android App Hijacking

StrandHogg 2.0 Critical Bug Allows Android App Hijacking a malicious app installed on a device can hide behind legitimate apps.
26 May 2020

Turla Backdoor Adds Gmail Web Interface for Command-and-Control

The latest version of ComRAT is another sign of the threat actor's continued focus on targets in the government, military, and other sectors.
26 May 2020

How to Pay a Ransom: A Step-By-Step Guide for Something You'd Never Do

How to Pay a Ransom: A Step-By-Step Guide for Something You'd Never Do Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your, um, friend's organization has fallen victim and is going to pay. Here's how they should handle it.
26 May 2020

How to Pay a Ransom

How to Pay a Ransom Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your organization has fallen victim and is going to pay. Here's how to handle it.
26 May 2020

Crooks threaten to leak customer data stolen from e‑commerce sites

A hack-and-extort campaign takes aim at poorly secured databases replete with customer information that can be exploited for further attacks

The post Crooks threaten to leak customer data stolen from e‑commerce sites appeared first on WeLiveSecurity

26 May 2020

Benefits of a Cloud-Based, Automated Cyber Range

Benefits of a Cloud-Based, Automated Cyber Range A cyber range is an irreplaceable tool that allows cybersecurity professionals to improve their response capabilities as well as their ability to identify risks.
26 May 2020