Cyber Security

0 Comments
Millions of files that are sitting out in the open across various file storage technologies are actually encrypted by ransomware More than 2.3 billion files have been found inadvertently exposed online over the past year, reads a report from threat intelligence outfit Digital Shadows. The firm’s new ‘Too Much Information: The Sequel’ report follows up
0 Comments
ESET researchers analyze new TTPs attributed to the Turla group that leverage PowerShell to run malware in-memory only Turla, also known as Snake, is an infamous espionage group recognized for its complex malware. To confound detection, its operators recently started using PowerShell scripts that provide direct, in-memory loading and execution of malware executables and libraries.
0 Comments
ESET sheds light on commands used by the favorite backdoor of the Sednit group What happens when a victim is compromised by a backdoor and the operator is controlling it? It’s a difficult question that is not possible to answer entirely by reverse engineering the code. In this article we will analyze commands sent by
0 Comments
ESET researchers have analyzed fake cryptocurrency wallets emerging on Google Play at the time of bitcoin’s renewed growth May 2019 has seen bitcoin growing, with its price climbing to its highest points since September 2018. Not surprisingly, cybercrooks were quick to notice this development and started upping their efforts in targeting cryptocurrency users with various
0 Comments
ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software In July 2018 we discovered that the Plead backdoor was digitally signed by a code-signing certificate that was issued to D-Link Corporation. Recently we detected a new activity involving the
0 Comments
What are some of the most interesting takeaways from Verizon’s latest annual security report? Data breach, yawn. Those two little words that occur so frequently in the media and will have you switching off. Last week, Verizon released their 2019 Data Breach Investigations Report (DBIR) which provides valuable insight spanning across 86 countries and 41,686
0 Comments
ESET research uncovers Microsoft Exchange malware remotely controlled via steganographic PDF and JPG email attachments Due to security improvements in operating systems, rootkit usage has been in constant decline for several years. As such, malware developers – especially those working in espionage groups – have been busy developing new stealthy userland malware. Recently, ESET researchers
0 Comments
The notorious six-digit string continues to ‘reign supreme’ among the most-hacked passwords An analysis of the 100,000 most-commonly re-occurring breached passwords confirms that ‘123456’ is the undisputed king of atrocious passwords. Using data from Have I Been Pwned (HIBP), a website that allows users to check if their email addresses or passwords have appeared in
0 Comments
On the good news front, the FBI notes the success of its newly-established team in recovering some of the funds lost in BEC scams Losses emanating from Business Email Compromise (BEC) and Email Account Compromise (EAC) scams reached nearly US$1.3 billion in 2018, which was nearly double the amount (US$675 million) lost in the year
0 Comments
Some users of Microsoft’s web-based email services such as Outlook.com had their account information exposed in an incident that, as it later emerged, also impacted email contents Microsoft has acknowledged a security incident that, for almost three months, gave hackers access to information related to an unknown number of email accounts on the tech giant’s
0 Comments
The new wireless security protocol contains multiple design flaws that hackers could exploit for attacks on Wi-Fi passwords WPA3, a new Wi-Fi security protocol launched in June 2018, suffers from vulnerabilities that make it possible for an adversary to recover the password of a wireless network via “efficient and low cost” attacks, according to a