• Wicked Botnet Uses Passel of Exploits to Target IoT

    May 21, 2018

    Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers. It also has ties to a web of other botnets, made for DDoS attacks, which can all ...

  • DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide

    May 21, 2018

    Widespread routers’ DNS hijacking malware that recently found targeting Android devices has now been upgraded its capabilities to target iOS devices as well as desktop users. Dubbed Roaming Mantis, the malware was initially found hijacking Internet routers last month to distribute Android banking malware designed to steal users’ login credentials and the secret code for two-factor authentication. Read more… Source: The ...

  • RedDawn Espionage Campaign Shows Mobile APTs on the Rise

    May 18, 2018

    A sophisticated and targeted mobile espionage campaign has been found targeting North Korean defectors. Mounted by a relatively new APT actor known as Sun Team, the offensive used Google Play and Facebook as attack vectors; and overall, it shows how quickly the mobile threat landscape is evolving as APTs shift tactics to focus on this ...

  • One Year After WannaCry: A Fundamentally Changed Threat Landscape

    May 17, 2018

    It’s been one year this week since the ransomware known as WannaCry infected more than 200,000 machines in 150 countries, causing billions of dollars in damages and grinding global business to a halt. The speed and scale of the attack – helped along by leaked National Security Agency hacking tools – was obviously notable, but ...

  • ​New Zealand gets NZ$3.9m ‘cyber’ boost in 2018 Budget

    May 17, 2018

    The New Zealand government has delivered its 2018 Budget, offering up NZ$3.9 million of new operating funding over the next four years to the Computer Emergency Response Team (CERT). CERT, established just over 12 months ago, responds to major cyber events and provides advice to businesses, organisations, and individuals who may be affected by cybersecurity incidents. The ...

  • DropBox To Pay 1.6 Million as Part of a California Auto-Renew Settlement

    May 17, 2018

    Alameda County District Attorney Nancy E. O’Malley announced yesterday a consumer protection settlement between DropBox and the Alameda, San Diego, San Francisco, and Sonoma Counties in California over auto-renewing of paid subscriptions. As part of this settlement and without admitting fault, DropBox has agreed to pay $1.6 million in civil penalties, $100 thousand to reimburse investigation costs, and $450,000 set ...

  • Airports are ill-equipped to deal with a major cyber-attacks

    May 16, 2018

    The report titled,‘Overcome the Silent Threat’, says that an increasing consumer demand for faster internet and digital engagement with airlines and retailers are providing cyber criminals with more opportunities to attack. According to the latest figures from the European Aviation Safety Agency, there are currently around 1,000 cyber-attacks each month on airport and aviation systems worldwide. Read more… Source: ...

  • Critical Linux Flaw Opens the Door to Full Root Access

    May 16, 2018

    Red Hat has patched a vulnerability affecting the DHCP client packages that shipped with Red Hat Enterprise Linux 6 and 7. A successful exploit could give an attacker root access and full control over enterprise endpoints. According to an alert issued Wednesday from US-CERT, the critical-rated flaw, first reported by Google researcher Felix Wilhelm, would “allow attackers to ...

  • Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

    May 16, 2018

    Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer, which involves the exploitation a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels. However, a separate team of security researchers has now demonstrated a second network-based remote Rowhammer technique that can be used to attack systems using uncached memory or ...

  • Phishing Spy Campaign Targets Top Mideast Officials

    May 15, 2018

    Researchers have discovered a phishing campaign that infected Android devices with custom surveillance-ware bent on extracting data from top officials, primarily in the Middle East. Researchers at Lookout Security told Threatpost that the tool, dubbed Stealth Mango, has been used to collect over 30 gigabytes of compromised data on attacker infrastructure, including call records, audio recordings, device ...

  • Kaspersky Lab To Open Swiss Data Centre, Amid Dutch Ban

    May 15, 2018

    Dutch government announces it will stop using Kaspersky Lab products, over national security concerns Moscow-based Kaspersky Lab has confirmed plans to build a data centre in Switzerland in an effort to allay Western national security concerns about its anti-virus software. The idea had first been mooted in March this year, and the Swiss facility The facility is to ...

  • This new type of DDoS attack takes advantage of an old vulnerability

    May 15, 2018

    A newly-uncovered form of DDoS attack takes advantage of a well-known, yet still exploitable, security vulnerability in the Universal Plug and Play (UPnP) networking protocol to allow attackers to bypass common methods for detecting their actions. Attacks are launched from irregular source ports, making it difficult to determine their origin and blacklist the ports in order ...

  • Facebook data on 3 million users reportedly exposed through personality quiz

    May 15, 2018

    Facebook data on more than 3 million people who took a personality quiz was published onto a poorly protected website where it could have been accessed by unauthorized parties, according to New Scientist. In a report exposing the potential leak, New Scientistsays that the data contained Facebook users’ answers to a personality trait test. While it didn’t include users’ ...

  • Ex-CIA man named as suspect in Vault 7 leak

    May 15, 2018

    A former CIA employee has been named as the prime suspect in last year’s dump of thousands of documents on the agency’s hacking practices. A report from The Washington Post cites court documents that name Joshua Adam Schulte as the person authorities think to be behind the massive Vault7 data dump. Read more… Source: The Register  

  • Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers

    May 15, 2018

    An unidentified hacker group appears to have accidentally exposed two fully-working zero-days when they’ve uploaded a weaponized PDF file to a public malware scanning engine. The zero-days where spotted by security researchers from Slovak antivirus vendor ESET, who reported the issues to Adobe and Microsoft, which in turn, had them patched within two months. Anton Cherepanov, ...

  • Pentagon Wants Cloud Secure Enough to Hold Nuke Secrets

    May 15, 2018

    The Pentagon’s JEDI cloud will be designed to store the military’s most sensitive classified information. The Defense Department’s Joint Enterprise Defense Infrastructure cloud will be designed to host the government’s most sensitive classified data, including critical nuclear weapon design information and other nuclear secrets. Read more… Source: DefenseOne  

  • Telco intercepts should be expanded to OTT providers: AGD

    May 14, 2018

    The Attorney-General’s Department (AGD) has argued in favour of extending Australia’s telecommunications interception laws from telcos to over-the-top providers. Speaking before the Joint Committee on Law Enforcement on Friday, AGD Assistant Secretary Andrew Warnes said this expansion would help combat the “challenge of encryption”. Read more… Source:  

  • Hackers Steal Millions From Mexican Banks Via Fake Transfers

    May 14, 2018

    The incident may have been orchestrated by organised criminals, says Mexico’s central bank Cyber-thieves have made off with hundreds of millions of pesos from Mexican banks using the country’s domestic electronic transfer system. The attack is similar to earlier ones that have used the international SWIFT network, prompting the Belgium-based organisation to bring in new security measures. Read more… Source: ...

  • Critical Flaws in PGP and S/MIME Tools Can Reveal Encrypted Emails in Plaintext

    May 13, 2018

    An important warning for people using widely used email encryption tools—PGP and S/MIME—for sensitive communication. A team of European security researchers has released a warning about a set of critical vulnerabilities discovered in PGP and S/Mime encryption tools that could reveal your encrypted emails in plaintext. What’s worse? The vulnerabilities also impact encrypted emails you sent in ...

  • Hacking train Wi-Fi may expose passenger data and control systems

    May 11, 2018

    Vulnerabilities on the Wi-Fi networks of a number of rail operators could expose customers’ credit card information, according to research from Pen Test Partners. The research was conducted over several years, said Pen Test’s Ken Munro. “In most cases they are pretty secure, although whether the Wi-Fi works or not is another matter,” he added. Read more… Source: ...