Cybersecurity News


IoT Malware Campaign Infects Global Manufacturing Sites

The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.
05 February 2020

Emotet Preps for Tax Season with New Phishing Campaign

Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms.
05 February 2020

CamuBot Banking Trojan Returns In Targeted Attacks

CamuBot Banking Trojan Returns In Targeted Attacks The malware is back in targeted attacks against Brazilian banking customers, this time using a new technique that involves mobile app authorization.
05 February 2020

What is a Privileged Access Workstation (PAW)?

What is a Privileged Access Workstation (PAW)? Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.
05 February 2020

Bug hunter finds cryptocurrency-mining botnet on DOD network

Monero-mining botnet infects one of the DOD's Jenkins servers.
05 February 2020

Keeping Compliance Data-Centric Amid Accelerating Regulation

As the regulatory landscape transforms, it's still smart to stay strategically focused on protecting your data.
05 February 2020

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers Malware campaign targets global manufacturers that are still dependent on Windows 7 subsystems to run fleets of IoT endpoints.
05 February 2020

Chrome to block intrusive video ads starting August 5, 2020

Google to implement new quality standard for video ads for Chrome, but also YouTube.
05 February 2020

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages.
05 February 2020

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast

Critical Cisco ‘CDPwn’ Protocol Flaws Explained: Podcast The researcher behind the five critical Cisco flaws, collectively called CDPwn, talks about why Layer 2 protocols are under-researched when it comes to security vulnerabilities.
05 February 2020

Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation

Critical Cisco ‘CDPwn’ Flaws Break Network Segmentation Cisco has released patches to address the five vulnerabilities, which could lead to remote code-execution and denial of service.
05 February 2020

CDPwn vulnerabilities impact tens of millions of enterprise devices

CDPwn vulnerabilities can be used to escalate initial access and completely take over entire networks.
05 February 2020

Hiring Untapped Security Talent Can Transform the Industry

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren't insulting
05 February 2020

UK small businesses say cyberattack fears, not cash flow, keeps them awake at night

The use of consumer rather than business-grade cybersecurity solutions is not helping matters.
05 February 2020

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Gamaredon APT Improves Toolset to Target Ukraine Government, Military The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […]
05 February 2020

Irish watchdog launches Google, Tinder GDPR data processing probe

The companies’ roles as data controllers are being examined in depth.
05 February 2020

How to catch a cybercriminal: Tales from the digital forensics lab

What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.

The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity

05 February 2020

How to catch a cybercriminal: Tales from the digital forensics lab

What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.

The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity

05 February 2020

Microsoft says it detects 77,000 active web shells on a daily basis

Microsoft detects and tracks a daily average of around 77,000 active web shells, spread across 46,000 infected servers.
05 February 2020

Malware stew cooked up on Bitbucket, deployed in attacks worldwide

Bitbucket is being abused and used as the host for cryptocurrency miners, ransomware, and Trojans deployed in a single attack chain.
05 February 2020