Cybersecurity News
Here's the NSA's guide for choosing a safe text chat and video conferencing service
NSA publishes guidance on choosing a secure teleworking service. Assessed tools include Slack, Zoom, Signal, Skype, more.30 April 2020
Shade Threat Actors Call It Quits, Release 750K Encryption Keys
The team behind the ransomware, first spotted in late 2014 and typically targeting Russian victims, apologized to victims in a post on GitHub.30 April 2020
Critical WordPress e-Learning Plugin Bugs Open Door to Cheating
The flaws in LearnPress, LearnDash and LifterLMS could have allowed unauthenticated students to change their grades, cheat on tests and gain teacher privileges.30 April 2020
Critical vulnerabilities in WordPress plugins lead to e-learning platform hijacking
The most serious issues discovered can be used in remote code execution attacks.30 April 2020
Sextortion scammers still shilling with stolen passwords
The email includes the potential victim’s password as evidence of a hack, but there is more than meets the eye
The post Sextortion scammers still shilling with stolen passwords appeared first on WeLiveSecurity
30 April 2020
Investors sue LabCorp over security failures in light of data breach, ransomware attack
The lawsuit claims that the company’s security posture led to investor losses.30 April 2020
This new Android mobile malware targets banks, financial services across Europe
Researchers believe EventBot has the potential to become the “next big mobile threat.”30 April 2020
Average Ransomware Payments Soared in the First Quarter
Criminals extorting large amounts of money from big enterprises pulled up the overall average significantly compared with the fourth quarter of 2019, Coveware says.29 April 2020
Election Security in the Age of Social Distancing
Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that older issues need to be resolved before November 3.29 April 2020
Election Security in the Age of Social Distancing
Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that there are other, older issues that need to be resolved before November 3.29 April 2020
86% of Companies Report Network Disruption Amid Remote Work Shift
Nearly two-thirds say disruptions were at least moderate in severity, and more have seen VPN connectivity issues as employees work from home.29 April 2020
High-Severity Cisco IOS XE Flaw Threatens SD-WAN Routers
Cisco's IOS XE software for SD-WAN routers has a high-severity insufficient input validation flaw.29 April 2020
Millions of Brute-Force Attacks Hit Remote Desktop Accounts
Automated attacks on Remote Desktop Protocol accounts are aimed at taking over corporate desktops and infiltrating networks.29 April 2020
Google announces Chrome Web Store crackdown for August 2020
Google plans to remove a bunch of garbage and useless Chrome extensions from the Web Store.29 April 2020
7 Secure Remote Access Services for Today's Enterprise Needs
Secure remote access is a "must" for enterprise computing today, and there are options for you to explore in the dynamic current environment.29 April 2020
Microsoft Warns of Malware Hidden in Pirated Film Files
An active campaign inserts malicious VBScript into ZIP files posing as downloads for "John Wick 3," "Contagion," and other popular movies.29 April 2020
7 Fraud Predictions in the Wake of the Coronavirus
It's theme and variations in the fraud world, and fraudsters love -- and thrive -- during chaos and confusion29 April 2020
Kaspersky: RDP brute-force attacks have gone up since start of COVID-19
RDP brute-force attack numbers rose in mid-March as quarantines were being imposed over the globe.29 April 2020
ThreatList: Human-Mimicking Bots Spike, Targeting e-Commerce and Travel
Overall bot activity on the web has soared, with a 26 percent growth rate -- attacks on applications, APIs and mobile sites are all on the rise.29 April 2020
Critical GitLab Flaw Earns Bounty Hunter $20K
A GitLab path traversal flaw could allow attackers to read arbitrary files and remotely execute code.29 April 2020