What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.webp 2019-07-12 11:06:05 Most 2020 Presidential Campaign Not Using Proper Email Security (lien direct) 2020 U.S. presidential campaigns are not using proper email security according to research from Californian-based email threat protection firm Agari. [...] Threat
bleepingcomputer.webp 2019-07-10 10:00:03 New eCh0raix Ransomware Brute-Forces QNAP NAS Devices (lien direct) A new ransomware strain written in Go and dubbed eCh0raix by the Anomali Threat Research Team is being used in the wild to infect and encrypt documents on consumer and enterprise QNAP Network Attached Storage (NAS) devices used for backups and file storage. [...] Ransomware Threat
bleepingcomputer.webp 2019-07-03 06:44:01 Trickbot Trojan Now Has a Separate Cookie Stealing Module (lien direct) Trickbot trojan now comes with a separate module for stealing browser cookies, threat researchers found on Tuesday, marking new progress in the malware's development. [...] Threat ★★★★
bleepingcomputer.webp 2019-06-18 11:26:02 Threat Actors Use Older Cobalt Strike Versions to Blend In (lien direct) Plenty of outdated Cobalt Strike servers exist in the wild, helping cybercriminals or giving security professionals the upper hand when testing corporate defenses; and they can be easily identified to stifle intrusions of any purpose. [...] Threat
bleepingcomputer.webp 2019-06-06 10:14:01 Another Hacker Selling Access to Charity, Antivirus Firm Networks (lien direct) A threat actor observed on underground hacker forums peddling internal network access to various entities claims to have breached the infrastructure of notable organizations such as UNICEF or cybersecurity companies Symantec and Comodo. [...] Threat ★★
bleepingcomputer.webp 2019-06-05 09:05:00 Scattered Canary Evolves From One-Man Operation to BEC Giant (lien direct) A Nigerian cybercriminal group dubbed Scattered Canary has evolved from one-man Craigslist and romance scams to a large scale criminal business running multiple types of frauds concomitantly and coordinating at least 35 threat actors. [...] Threat
bleepingcomputer.webp 2019-06-04 13:30:00 Attackers Stitch Together Frankenstein Campaign Using Free Tools (lien direct) Threat actors behind a highly-targeted series of cyber attacks spanning from January to April 2019 have been seen employing malicious tools built using freely available components to infect victims with malware designed to harvest credentials. [...] Malware Threat
bleepingcomputer.webp 2019-06-03 20:59:02 BlackSquid Uses 7 Exploits to Infect Web Servers with Miners (lien direct) A newly discovered cryptomining threat targeting web servers, network drives, and removable drives comes filled to the brim with exploits and precautions against analysis tools and environments. [...] Threat
bleepingcomputer.webp 2019-05-28 12:08:04 Emotet Botnet Behind Most Email-Based Threats in Q1 2019 (lien direct) The multifunctional Emotet botnet malware was the most prevalent email-based threat in the first three months of the year, showing it is among the top choices for cybercriminals. [...] Malware Threat ★★★★★
bleepingcomputer.webp 2019-05-20 16:10:01 Microsoft Defender ATP Adds Live Response for SecOps (lien direct) Microsoft announced the addition of live response capabilities to its Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) enabling security operation teams to perform system forensic analysis remotely. [...] Threat
bleepingcomputer.webp 2019-05-13 11:52:00 New Details Emerge of Fxmsp\'s Hacking of Antivirus Companies (lien direct) It is difficult to fathom that a threat actor may be able to breach the networks of a reputed security company. Yet, this is not only possible but also happened in the past; and it is not far-fetched to believe that it is the case with at least three antivirus makers, as reported by BleepingComputer earlier this week. [...] Threat
bleepingcomputer.webp 2019-05-07 09:14:03 NSA Hacking Tools Used by Chinese Hackers One Year Before Leak (lien direct) A Chinese threat group was using hacking tools developed by the NSA more than a year before Shadow Brokers leaked them in April 2017, tools that were later used in highly destructive attacks such as the WannaCry ransomware campaign from May 2017. [...] Threat Wannacry ★★★
bleepingcomputer.webp 2019-04-10 16:03:00 Threat Group Uses Pastebin, GitHub In SneakyPastes Operation (lien direct) A threat group considered the runt of the litter in terms of the complexity of its operations, in 2018 launched operation SneakyPastes, relying to a large extent on services like Pastebin and GitHub to host malware for various stages of the infection chain. [...] Malware Threat
bleepingcomputer.webp 2019-04-09 12:45:00 Cryptominers Still Top Threat In March Despite Coinhive Demise (lien direct) Although Coinhive shut down and its cryptominer dropped down on the sixth place in Check Point's latest Global Threat Index, coinminers continue to lead the pack with Cryptoloot, XMRig, and Jsecoin taking the first, third, and fifth place. [...] Threat Guideline
bleepingcomputer.webp 2019-04-04 03:34:00 New Xwo Web Scanner Helps MongoLock Ransomware Find Victims (lien direct) Code and infrastructure from two known malware families have been observed with a new threat named Xwo, which helps operators of the MongoLock ransomware discover unprotected web services reachable over the internet. [...] Ransomware Malware Threat
bleepingcomputer.webp 2019-03-27 17:21:03 Microsoft Defender ATP Adds Tamper Protection (lien direct) Microsoft announced the addition of a "Tamper protection" feature to the Microsoft Defender Advanced Threat Protection (ATP) designed to block changes to key security features, as well as to prevent disabling the antimalware solution and to delete security updates. [...] Threat
bleepingcomputer.webp 2019-03-27 15:39:03 Microsoft Retaliates Against APT35 Hacker Group by Seizing 99 Domains (lien direct) Court documents unsealed today show how Microsoft's Digital Crimes Unit was able to block some of the cyber attacks conducted by an Iranian-backed advanced persistence threat (APT) group by taking over domains used as part of their core operations. [...] Threat APT 35
bleepingcomputer.webp 2019-03-26 11:55:01 ASUS Admits Its Live Update Utility Was Backdoored by APT Group (lien direct) Asus confirmed today that its Live Update utility has been indeed infected with malicious code by an advanced persistent threat (APT) group as part of a supply chain attack which managed to compromise some of its servers. [...] Threat
bleepingcomputer.webp 2019-03-25 12:35:01 ASUS Live Update Infected with Backdoor in Supply Chain Attack (lien direct) A new advanced persistent threat (APT) campaign detected by Kaspersky Lab in January 2019 and estimated to have run between June and November 2018 has allegedly impacted over 57,000 users who have downloaded the ASUS Live Update Utility on their computers. [...] Threat
bleepingcomputer.webp 2019-03-21 11:24:01 Microsoft Defender ATP Brings Enterprise Protection to Macs (lien direct) Microsoft announced that the Windows Defender Advanced Threat Protection (ATP) enterprise platform is now available for macOS as part of a limited preview starting today and rebranded as Microsoft Defender ATP to reflect its new cross-platform support. [...] Threat
bleepingcomputer.webp 2019-03-03 23:30:04 Op \'Sharpshooter\' Connected to North Korea\'s Lazarus Group (lien direct) After analyzing a command and control (C2) server used in the global cyber-espionage campaign dubbed 'Sharpshooter', security researcher found more evidence linking it to North Korea's Lazarus threat actor. [...] Threat APT 38
bleepingcomputer.webp 2019-02-28 09:00:00 Microsoft Announces Azure Sentinel and Threat Experts Cloud-Based Tech (lien direct) Microsoft announced its new cloud-based Microsoft Azure Sentinel and Microsoft Threat Experts solutions designed to allow security professionals to react faster and provide adequate responses during cyber attacks. [...] Threat
bleepingcomputer.webp 2019-02-27 08:22:00 Cyber-Espionage Group Customizes Old, Public Tools (lien direct) A cyber-espionage threat actor believed to operate from China relies for its activities on publicly available tools; the source code for some of them has been released as early as 2007. [...] Threat
bleepingcomputer.webp 2019-02-22 16:09:01 DDoS Attacks Ranked As Highest Threat by Enterprises (lien direct) US and EMEA security professionals interviewed by the Neustar International Security Council (NISC) in January 2019 said that DDoS attacks are perceived as the highest threat to their organizations, with roughly half of their companies having been attacked in 2018. [...] Threat
bleepingcomputer.webp 2019-02-20 13:13:03 Formjacking Surpasses Ransomware and Cryptojacking as Top Threat of 2018 (lien direct) A new year in review report from Symantec shows that formjacking accompanied by supply chain attacks were the fastest growing threats of 2018, while living-off-the-land (LotL) attacks saw a large boost in adoption from threat actors, with PowerShell scripts usage, for example, seeing a formidable 1000% increase. [...] Ransomware Threat
bleepingcomputer.webp 2019-01-31 09:34:04 Dell Introduces Dell SafeGuard and Response Solutions To Fight Evolving Threats (lien direct) Dell released of a portfolio of endpoint security solutions which combine leading managed security services with premier endpoint protection technology from CrowdStrike and global incident response and threat intelligence from Secureworks [...] Threat Guideline
bleepingcomputer.webp 2019-01-23 06:02:05 (Déjà vu) New Anatova Ransomware Supports Modules for Extra Functionality (lien direct) A new ransomware family popped on the radar of analysts, who see it as a serious threat created by skilled authors that can turn it into a multifunctional piece of malware. [...] Ransomware Threat
bleepingcomputer.webp 2019-01-23 06:02:05 (Déjà vu) New Ransomware Anatova Has Potential for Extended Functionality (lien direct) A new ransomware family popped on the radar of analysts, who see it as a serious threat created by skilled authors that can turn it into a multifunctional piece of malware. [...] Ransomware Threat
bleepingcomputer.webp 2019-01-08 12:26:05 Microsoft Adding Office 365 Threat Auto-Investigation to GCC Offering (lien direct) The auto-Investigation with threat playbooks feature was included in the roadmap in October and was now also added to Microsoft's future Office 365 Government GCC offering [...] Threat
bleepingcomputer.webp 2019-01-04 02:22:00 New Phishing Tactic Uses Custom Web Fonts to Prevent Detection (lien direct) Threat actors in the phishing business have adopted a new technique to obfuscate the source code for the forged page by using a custom web font to implement a substitution cipher that looks like plaintext. [...] Threat
bleepingcomputer.webp 2019-01-02 13:30:05 Microsoft Adds New Microsoft 365 Security and Compliance Bundles (lien direct) The Identity & Threat Protection and Information Protection & Compliance packages will be available for purchase from February 1, 2019, under a subscription model. [...] Threat
bleepingcomputer.webp 2018-12-19 14:06:02 Microsoft Releases Out-of-Band Security Update for Internet Explorer RCE Zero-Day (lien direct) Microsoft has released an out-of-band security update that fixes an actively exploited vulnerability in Internet Explorer.  This vulnerability has been assigned ID CVE-2018-8653 and was discovered by Google's Threat Analysis Group when they saw the vulnerability being used in targeted attacks. [...] Vulnerability Threat
bleepingcomputer.webp 2018-12-13 16:38:04 New Bomb Threat Email Scam Campaign Demanding $20K in Bitcoin (lien direct) A new twist in the scam extortion emails that have been so popular recently is a new email campaign that contains a bomb threat stating they will detonate a bomb if the recipient does not send a $20,000 USD bitcoin payment. [...] Threat
bleepingcomputer.webp 2018-12-12 11:26:05 Op \'Sharpshooter\' Uses Lazarus Group Tactics, Techniques, and Procedures (lien direct) A new advanced threat actor has emerged on the radar, targeting organizations in the defense and the critical infrastructure sectors with fileless malware and an exploitation tool that borrows code from a trojan associated with the Lazarus group [...] Malware Tool Threat Medical APT 38
bleepingcomputer.webp 2018-12-05 12:28:05 Company Pretends to Decrypt Ransomware But Just Pays Ransom (lien direct) Ransomware is a serious threat but also a lucrative business for crooks and scammers posing as IT professionals promising successful decryption services for the right price. [...] Ransomware Threat ★★★★
bleepingcomputer.webp 2018-11-30 03:04:00 New KingMiner Threat Shows Cryptominer Evolution (lien direct) A recently discovered cryptomining operation forces access to Windows servers to use their CPU cycles for minting Monero coins. Detected six months ago, the activity went through multiple stages of evolution. [...] Threat
bleepingcomputer.webp 2018-11-20 09:26:01 New Cannon Trojan Is the Latest Asset of Sofacy APT Group (lien direct) Advanced threat group Sofacy delivers a new malware sample dubbed Cannon in a spear-phishing attack that targets government organizations in North America, Europe and in a former Soviet state. [...] Malware Threat
bleepingcomputer.webp 2018-11-14 07:50:03 Microsoft Patches Windows Zero-Day Exploited in Cyber Attacks (lien direct) A zero-day vulnerability in certain editions of Windows operating system helped at least one advanced threat group increase their privileges on compromised machines until Microsoft patched it with this month's release of security updates. [...] Vulnerability Threat
bleepingcomputer.webp 2018-10-18 00:01:00 New Reconnaissance Tool Uses Code from Eight-Year-Old Comment Crew Implant (lien direct) A newly discovered first-stage implant targeting Korean-speaking victims borrows code from another reconnaissance tool linked to Comment Crew, a Chinese nation-state threat actor that was exposed in 2013 following cyber espionage campaigns against the United States. [...] Tool Threat APT 1
bleepingcomputer.webp 2018-10-17 07:03:04 New GreyEnergy Malware Targets ICS, Tied with BlackEnergy and TeleBots (lien direct) A new advanced threat actor is now on the public map of adversaries that target systems in the critical infrastructure sector. The name is GreyEnergy and it shows similarities with the BlackEnergy group. [...] Malware Threat
bleepingcomputer.webp 2018-10-12 05:06:01 (Déjà vu) Largest Cyber Attack Against Iceland Driven by Fareit-Remcos Combo (lien direct) A brazen phishing campaign took Iceland by surprise the last weekend, sending out malicious emails to thousands of individuals, in an attempt to fool them into installing a new threat that mixes code from different sources.Even if the number of potential victims may seem low, local police say this is the largest cyber attack to hit the country. One must take into consideration that the population of Iceland is around 350,000, with about half of the citizens living in the capital city Reykjavik. By comparison, in 2016 London lived over 8.5 million people. [...] Threat
bleepingcomputer.webp 2018-09-24 09:10:05 Microsoft Rolls Out Confidential Computing for Azure (lien direct) At the Ignite developer's conference today, Microsoft announces that the Azure cloud platform will soon integrate data protection features that keep information safe from the looming threat of a data breach. [...] Threat
bleepingcomputer.webp 2018-09-24 09:00:00 Microsoft\'s New Threat Protection Service Gives Security Overview for Orgs (lien direct) At today's Ignite 2018 conference, Microsoft announced a new end-to-end security solution called Microsoft Threat Protection. Microsoft Threat Protection is designed to provide a view of an organization's overall threat landscape so that administrators can easily spot new threats and attacks. [...] Threat
bleepingcomputer.webp 2018-09-12 08:25:02 Crooks Combine Phishing and Impersonation For Higher Success Rate (lien direct) While phishing continues to be the prevalent threat in malware-less email-based attacks, cybercriminals refine their methods by adding an impersonation component to increase the success rate against company employees. [...] Threat
bleepingcomputer.webp 2018-09-06 20:46:00 New Chainshot Malware Found By Cracking 512-Bit RSA Key (lien direct) Security researchers exploited a threat actor's poor choice for encryption and discovered a new piece of malware along with network infrastructure that links to various targeted attacks. [...] Malware Threat
bleepingcomputer.webp 2018-08-17 13:50:00 Flaws in Smart Irrigation Systems Expose Water Utilities to Botnet-Grade Attacks (lien direct) Smart water irrigation systems deployed across a city, region, or even a country, can be hijacked by nefarious threat actors who could cause a mass water crisis by forcing these systems to consume more water than usual. [...] Threat
bleepingcomputer.webp 2018-08-09 09:34:00 A First Look at the North Korean Malware Family Tree (lien direct) Security researchers have analyzed malware samples from threat actors associated with North Korea and discovered connections with tools from older unattributed campaigns. [...] Malware Threat
bleepingcomputer.webp 2018-08-08 18:32:02 DarkHydrus Relies on Open-Source Tools for Phishing Attacks (lien direct) A threat actor named DarkHydrus that is relatively new to the scene relies on open-source tools for spear-phishing attacks designed to steal credentials from government and educational institutions in the Middle East. [...] Threat
bleepingcomputer.webp 2018-07-27 13:55:02 The Week in Ransomware - July 27th 2018 - Ransomware Still a Threat (lien direct) While the distribution of ransomware has definitely decreased, it is still very much a threat as seen by the Alaskan borough of Matanuska-Susitna and the shipping company Cosco getting hit by ransomware this week. Both attacks shut down their operations and caused normal workflow to be halted. [...] Ransomware Threat
bleepingcomputer.webp 2018-03-12 16:05:01 Fake Fortnite Mobile iOS Invites Being Pushed On Social Sites (lien direct) Whenever something newsworthy comes out there will always be people who try to take advantage of it. A perfect example of this is the Fortnite iOS mobile invite that launched today, where people are impatiently waiting for the invite codes to be released, while others try to trick them into purchasing fake ones. [...] Threat
Last update at: 2024-06-26 05:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter