Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-09-13 22:49:19 |
PSA: New Microsoft Word 0day used in the wild (lien direct) |
Read more about the latest Microsoft Word Zero-Day and how to protect yourself against it.
Categories:
Exploits
Threat analysis
Tags: 0dayCVE-2017-8759microsoftmicrosoft wordpatchwordzero day
(Read more...)
|
|
|
|
|
2017-09-13 16:27:50 |
Multiple flaws found in smart syringe pump (lien direct) |
As more life-saving medical devices are capable of connecting to the internet, the potential threat of malicious hacking leading to physical bodily harm becomes more real. An independent researcher recently found multiple vulnerabilities plaguing a particular syringe pump. ICS-CERT offers several defensive measures.
Categories:
Security world
Technology
Tags: IoTiot threatsMedfusion 4000 Wireless Syringe Infusion Pumpmedical devicemedical device threatsmart syringe pumpsyringe pump vulnerability
(Read more...)
|
Guideline
|
|
|
|
2017-09-13 15:00:34 |
Remediation vs. prevention: How to place your bets (lien direct) |
Building a security environment for businesses is a gamble these days. It's remediation vs. prevention. Which should you bet on?
Categories:
101
Business
Tags: breachcyberattackcybersecurity policyIT adminsmalwarepreventionransomwareremediation
(Read more...)
|
|
|
|
|
2017-09-12 17:24:39 |
Compromised LinkedIn accounts used to send phishing links via private message and InMail (lien direct) |
A recent attack uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external members via email.
Categories:
Social engineering
Threat analysis
Tags: gmailinmailLinkedInmalwarephishingscamSocial Engineering
(Read more...)
|
|
|
|
|
2017-09-11 19:53:29 |
A week in security (September 4 – September 10) (lien direct) |
A compilation of security news and blog posts from the 4th - 10th September. We touched on threat surveys, Android patching, the Equifax breach and more!
Categories:
Security world
Week in security
Tags: ddoshackersmalvertisingmalwareroundupspamweek in security
(Read more...)
|
|
Equifax
|
|
|
2017-09-08 15:00:14 |
Fake DHS email – “Give us $350 in the next 24 hours†(lien direct) |
Every now and then, we see the 419 "Hitman deployed to kill you" missive doing the rounds. This time, we have a fake DHS notification telling you to pay a $350 fee within 24 hours - or else.
Categories:
Cybercrime
Social engineering
Tags: Department of Homeland SecurityDHSscamscammers
(Read more...)
|
|
|
|
|
2017-09-08 07:02:47 |
Equifax breach: What you need to know (lien direct) |
On July 29, 2017, Equifax discovered that attackers had gained unauthorized access to private data belonging to an estimated 143 million Americans by exploiting a vulnerability in a website application.
Categories:
Cybercrime
Hacking
Tags: breachdata breachEquifaxidentity theft
(Read more...)
|
|
Equifax
|
|
|
2017-09-07 15:36:57 |
Google reminds website owners to move to HTTPS before October deadline (lien direct) |
To encourage website owners and service providers to move to HTTPS, Google began sending out emails to remind them that their sites will be marked as insecure if they don't comply. This is the latest step in the search giant's long-term effort of creating a safer web experience for every user.
Categories:
101
FYI
Tags: ev sslextended validation certificateGoogleHTTPSphishingssl certificate
(Read more...)
|
|
|
|
|
2017-09-07 15:00:21 |
Explained: False positives (lien direct) |
False positives are alarms for non-specific files or behavior that is flagged as malicious, while in fact there were no bad intentions present.
Categories:
Security world
Technology
Tags: Explainedf/pfalse positivesPieter Arntzthe more you know
(Read more...)
|
|
|
|
|
2017-09-06 23:00:09 |
Nigerian scams without the Nigerians (lien direct) |
Many in the United States are familiar with Nigerian scams, but what kind of scams are going on in non-English countries? Take a look at the Chinese version – the seminar scam.
Categories:
Cybercrime
Social engineering
Tags: 419 scamchinaChinese scamfraudscamseminar scamspam
(Read more...)
|
|
|
|
|
2017-09-06 15:00:12 |
Facebook worries: I didn\'t post that (lien direct) |
|
|
|
|
|
2017-09-05 15:00:08 |
Expired domain names and malvertising (lien direct) |
A look at how expired domain names can be turned into a lucrative malicious traffic redirection tool.
Categories:
Malware
Threat analysis
Tags: domainmalvertisingmalwareregistrantregistrartech support scam
(Read more...)
|
|
|
|
|
2017-09-04 17:00:53 |
A week in security (August 28 – September 3) (lien direct) |
Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived into Locky, again, a ransomware that just made a comeback, and found that its latest variant (as of this writing) has anti-sandboxing capabilities. This means that once Locky has determined that it’s residing in...
Categories:
Security world
Week in security
Tags: 419 scamexploit kitinsider threatskronosLockymalvertisingPrincessLockerransomwarerecapRIGsecurityweekly blog roundup
(Read more...)
|
|
|
|
|
2017-09-01 16:52:23 |
Insider threats in your work inbox (lien direct) |
A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.
Categories:
Business
Security world
Tags: becBusiness Email Compromisecloudinsider threatsphishingthreat actor
(Read more...)
|
|
|
|
|
2017-08-31 20:04:32 |
RIG exploit kit distributes Princess ransomware (lien direct) |
A new campaign via the RIG exploit kit is pushing the Princess ransomware.
Categories:
Cybercrime
Exploits
Tags: exploit kickmalwareprincess ransomwareransowmareRIG
(Read more...)
|
|
|
|
|
2017-08-31 16:09:39 |
Locky ransomware adds anti sandbox feature (updated) (lien direct) |
Locky ransomware attempts to evade detection by relying once more on simple, yet effective user interaction.
Categories:
Malware
Threat analysis
Tags: LockyLocky ransomwaremacroransomwareword
(Read more...)
|
|
|
|
|
2017-08-31 15:00:41 |
BSides Manchester: Malvertising – under the hood (lien direct) |
Researcher Chris Boyd gave a talk at BSides Manchester on the subject of malvertising, and we have the full thing in video format for you to watch.
Categories:
Conferences
Security world
Tags: bsidesBSides Manchesterconferenceconferencesmalvertisingmanchester
(Read more...)
|
|
|
|
|
2017-08-30 18:00:10 |
Malware vaccination tricks: blue pills or red pills (lien direct) |
Malware vaccination tricks are offered for various sorts and families of malware, but can and should we use them? What are the pros and cons? Read all about it.
Categories:
Cybercrime
Malware
Tags: canary filekeyboardlanguagemalwareMalwarebytesPieter Arntzransomwareregistry keyvaccinationvaccinevirtual machine
(Read more...)
|
|
|
|
|
2017-08-29 17:10:55 |
419 spam: 10 million US dollars, courtesy of “Rev. Goodluck Ebola†(lien direct) |
A 419 email is currently doing the rounds with promises of $10.5m USD waiting to be sent your way. This is most definitely something you don't want to get tangled up in.
Categories:
Cybercrime
Social engineering
Tags: 419fakephishphishingscamspam
(Read more...)
|
|
|
|
|
2017-08-29 15:00:00 |
Inside the Kronos malware – part 2 (lien direct) |
In part two of our Kronos malware analysis, we look at the malicious actions Kronos can perform.
Categories:
Cybercrime
Malware
Tags: banking TrojanCitibankfacebookkronosKronos malwaremalwaretrojanWells FargoZeus malware
(Read more...)
|
|
|
|
|
2017-08-28 17:38:08 |
A week in security (August 21 – August 27) (lien direct) |
A compilation of security news and blog posts from the 21st of August to the 27th of August. Big news from Malwarebytes was the introduction real-time protection for Mac and Android.
Categories:
Security world
Week in security
Tags: Androiddigital forensicsfacebookGooglemacMalwarebytes for AndroidMalwarebytes for Macreal time protectionuser agentweekly blog roundup
(Read more...)
|
|
|
|
|
2017-08-28 17:00:21 |
Mobile Menace Monday: Implications of Google Play Protect (lien direct) |
Along with the recent release of Google's new OS Android 8.0 Oreo, they also released a new security suite known as Google Play Protect.
Categories:
Cybercrime
Mobile
Tags: AndroidGooglemalware scannermobile malwareplay protect
(Read more...)
|
|
|
|
|
2017-08-25 15:30:46 |
Explained: digital forensics (lien direct) |
Digital forensics is different from cyber-security as it deals with the problem when it's too late for precautions. It's the science of figuring out what happened just before and after a breach.
Categories:
Security world
Technology
Tags: digitalforensicsPieter Arntzthe more you know
(Read more...)
|
|
|
|
|
2017-08-24 14:00:20 |
Solution Corner: Malwarebytes for Android (lien direct) |
Don't let your Android phone or tablet be a source of trouble. Protect it with Malwarebytes for Android today!
Categories:
Malwarebytes news
Product updates
Tags: AndroidmalwareMalwarebytes for AndroidPUPsransomwaretrojan
(Read more...)
|
|
|
|
|
2017-08-24 13:00:22 |
Solution Corner: Malwarebytes for Mac (lien direct) |
Mac users have been told for years: Macs don't get viruses. That's not true! Stay protected with Malwarebytes for Mac.
Categories:
Malwarebytes news
Product updates
Tags: adwareAppleElk Cloner viruskeyloggersmacmac malwareMacbookmalwareMalwarebytes for MacPUPsspyware
(Read more...)
|
|
|
|
|
2017-08-23 19:04:56 |
4 Steps for improving employee trust while securing them (lien direct) |
4 key steps you can take within your business to help gain trust with your employees while educating them to make more secure decisions.
Categories:
101
Business
Tags: businessCTNTcybercrime tactics and techniquescybercriminalscybersecuritysecurity
(Read more...)
|
|
|
|
|
2017-08-22 15:18:41 |
Explained: user agent (lien direct) |
This post explains the pros and cons of using user agents when browsing the world wide web. What does it reveal and why?
Categories:
Security world
Technology
Tags: browserchromecrawleremail clientsmozillaPieter Arntzuser agentwebsite
(Read more...)
|
|
|
|
|
2017-08-21 16:02:37 |
(Déjà vu) A week in security (August 14 – August 20) (lien direct) |
A compilation of security news and blog posts from the 14th of August to the 20th of August. We looked at back to school cybersecurity tips, Kronos malware, and the return of Locky ransomware.
Categories:
Security world
Week in security
Tags: kronosKronos malwareLockyLocky ransomwareransomwarerecapweekly blog roundup
(Read more...)
|
|
|
|
|
2017-08-18 15:14:29 |
Inside the Kronos malware – part 1 (lien direct) |
The first part of this research looks at the tricks used by the Kronos banking malware.
Categories:
Cybercrime
Malware
Tags: bankerkronosmalwaremalwaretechransomwareWannaCry
(Read more...)
|
|
Wannacry
|
|
|
2017-08-16 17:57:10 |
Locky ransomware returns to the game with two new flavors (lien direct) |
We recently observed a fresh malicious spam campaign pushed through the Necurs botnet distributing so far, two new variants of Locky ransomware.
Categories:
Cybercrime
Malware
Social engineering
Tags: Diablo6LockyLocky ransomwareLukitusmalspamnecursransomware
(Read more...)
|
|
|
|
|
2017-08-14 19:51:26 |
Week in Security (August 7 – August 13) (lien direct) |
A compilation of security news and blog posts from Monday the 7th of August to August 14th. We looked at security certificates and the new bloated Cerber ransomware.
Categories:
Security world
Week in security
Tags: cerbercertificatesdnaLockyMagnitudemambaransomwaresecurityweekly blog roundup
(Read more...)
|
|
|
|
|
2017-08-14 16:35:16 |
Back to school cybersecurity tips for parents and kids (lien direct) |
When you buy your child new devices, it's important to lay down some ground rules-especially when it comes to security. That's why we're providing you with a cybersecurity checklist you can use to prepare your children for the coming school year.
Categories:
101
How-tos
Tags: back to schoolback to school cybersecuritysecurity
(Read more...)
|
|
|
|
|
2017-08-09 15:54:54 |
Cerber ransomware delivered in format of a different order of Magnitude (lien direct) |
We review a trick that the Magnitude exploit kit uses to bypass security scanners.
Categories:
Exploits
Threat analysis
Tags: binary paddingcerberexploit kitgateMagnigatemagnitude EKransomwareXML
(Read more...)
|
|
|
|
|
2017-08-08 18:17:21 |
Explained: security certificates (lien direct) |
Do you want to know how security certificates work and let us show you how malware can abuse the certificates system to block you from downloading and/or running your favorite software.
Categories:
Security world
Technology
Tags: Pieter Arntzsecurity certificatestrusted rootunable to connect to the serviceuntrustedWDFLoad
(Read more...)
|
|
|
|
|
2017-08-07 19:19:51 |
A week in security (July 31 – August 6) (lien direct) |
A compilation of security news and blog posts from the 31th of July to August 6th. We look at the events of BlackHat and DefCon, explore some new TrickBot tactics, delve into PowerShell commands and link some of the most notable security stories of the past week.
Categories:
Security world
Week in security
Tags: round uproundupweek in securityweekly round up
(Read more...)
|
|
|
|
|
2017-08-07 15:30:59 |
Apple phish: Summary report statement (lien direct) |
We take a look at an Apple ID phish currently in circulation, and examine some of the tell-tale signs you may have this lurking in your mailbox.
Categories:
Cybercrime
Social engineering
Tags: Applephishphishing
(Read more...)
|
|
|
|
|
2017-08-04 18:00:35 |
Learning PowerShell: basic programs (lien direct) |
In this last part of the short series about the basics of PowerShell we assemble a small script from scratch and explain how it works.
Categories:
101
How-tos
Tags: certificatesPieter Arntzpowershellprogramscript
(Read more...)
|
|
|
|
|
2017-08-04 16:11:10 |
DEFCON 25 (lien direct) |
A quick overview of several interesting talks at DEF CON 25, the hacking conference that was held in Las Vegas July 27-30, 2017
Categories:
Conferences
Tags: conferencedefconlas vegas
(Read more...)
|
|
|
|
|
2017-08-02 21:54:05 |
Black Hat USA 2017 Recap (lien direct) |
Missed Black Hat USA 2017? Here's a little recap of the event and the Malwarebytes booth.
Categories:
Conferences
Security world
Tags: AIblack hatBlack Hat USABlack Hat USA 2017Endpoint ProtectionIncident Responsemachine learning
(Read more...)
|
|
|
|
|
2017-08-02 15:00:06 |
Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain (lien direct) |
This post shines some light on a 'gate' belonging to the geo-targeted Magnitude exploit kit.
Categories:
Cybercrime
Exploits
Tags: cerberEKexploit kitkoreaMagnigateMagnitudemalvertisingransomware
(Read more...)
|
|
|
|
|
2017-08-01 19:10:43 |
TrickBot comes with new tricks – attacking Outlook and browsing data (lien direct) |
TrickBot is still actively maintained and it is not going to leave the landscape any soon. Take a look at its new modules.
Categories:
Malware
Threat analysis
Tags: dyrezaEternalPetyamalwareOutlookransomwaretrickbotWannaCry
(Read more...)
|
|
Wannacry
|
|
|
2017-08-01 15:00:12 |
Learning PowerShell: some basic commands (lien direct) |
We are going to construct some basic PowerShell commands and explain how they work just to show you how useful PowerShell can be. For good and for bad.
Categories:
101
How-tos
Tags: certificatescommandsPieter ArntzpowershelltrojanVonteera
(Read more...)
|
|
|
|
|
2017-07-31 19:21:14 |
A week in security (July 24 – July 30) (lien direct) |
A compilation of security news and blog posts from the 24th of July to the 30th. We talked about ransomware, the Dark Web, smart toys, encryption, and other.
Categories:
Security world
Week in security
Tags: a week in securityDark Webpetyaransomwarerecapweekly roundup
(Read more...)
|
|
|
|
|
2017-07-31 14:00:42 |
Mobile Menace Monday: Malicious clicker with extra maliciousness included (lien direct) |
A new malicious clicker has emerged onto third-party app stores.
Categories:
Cybercrime
Mobile
Tags: AndroidclickerClicker.hyjmalwaresms scamtriple m
(Read more...)
|
|
|
|
|
2017-07-28 18:56:25 |
Today is System Administrator Appreciation Day (lien direct) |
It's the last Friday of July, and today-more than any day-is the perfect day to recognize and express our gratitude to the mighty men and women who make our work life in the office a little more manageable if not totally stress-free, technology- and IT concerns-wise.
Categories:
101
FYI
Tags: gratefulsysadminsystem administrator appreciation day
(Read more...)
|
|
|
|
|
2017-07-28 15:30:25 |
Fireball arrests made (lien direct) |
Following some arrests in China, we hope to see a decrease in the amount of adware and adfraud hailing from the Rafotech labs aka Fireball.
Categories:
Cybercrime
Malware
Tags: ad fraudadwareelexfireballPieter Arntzrafotech
(Read more...)
|
|
|
|
|
2017-07-27 16:00:52 |
The state of ransomware among SMBs (lien direct) |
Learn about the state of ransomware among SMBs and other critical security issues in a report conducted by Osterman Research and sponsored by Malwarebytes.
Categories:
101
Business
Tags: infographicransomwaresmall business ransomwaresmall businesses
(Read more...)
|
|
|
|
|
2017-07-27 14:00:36 |
The real problem with ransomware (lien direct) |
Ransomware is an extremely serious problem and it's quickly getting worse. The primary impact of downtime for your company is not the ransom that is being demanded of you, but instead, the real cost of ransomware is the downtime it will cause.
Categories:
Cybercrime
Malware
Tags: Anti-RansomwareMichael OstermanOstermanOsterman reportOsterman Researchransomware
(Read more...)
|
|
|
|
|
2017-07-26 17:00:33 |
Explained: the Dark Web (lien direct) |
How is the Dark Web different from the regular internet? We unravel a few misconceptions to bring you closer to the truth.
Categories:
Security world
Technology
Tags: Dark Webdeep webExplainedonionPieter Arntzsurface webtorbrowser
(Read more...)
|
|
|
|
|
2017-07-26 15:00:43 |
SteelCon: Mahkra ni Orroz (lien direct) |
This post take a look behind the scenes of how a conference presentation is put together - specifically, researcher Chris Boyd's Mahkra ni Orroz at the recent SteelCon security conference.
Categories:
Conferences
Security world
Tags: conferencemahkra ni orrozsteelcon
(Read more...)
|
|
|
|