Google announced that mitigations for devices with Intel processors that are affected by the Spectre and Meltdown vulnerabilities will be available for latest stable channel update for Google’s Chrome OS operating system. The Meltdown and Spectre attacks could be exploited by attackers to bypass memory isolation mechanisms and access target sensitive data. The Meltdown attack could allow attackers […]
Hacking
Dropbox may be valued at $8 Billion after its Initial Public Offering
The Company announced that it will be increasing its IPO price range to sell its shares for more profit by including all shares contributed by stockholders, selling in this offering, the “greenshoe” and the original IPO, Dropbox will have a cost between $7.2 billion and $7.96 billion. It’s below Dropbox’s […]
TeleRAT, a new Android Trojan that uses Telegram for data exfiltration
Security experts at Palo Alto Networks discovered a new Android Trojan dubbed TeleRAT that uses Telegram Bot API to communicate with the command and control (C&C) server and to exfiltrate data. TeleRAT appears to be originating from and/or to be targeting individuals in Iran, experts found similarities with another Android malware dubbed […]
Q4 2017 Global DDoS Threat Landscape Report
Today we are releasing our latest Global DDoS Threat Landscape Report, a statistical analysis of 5,055 network and application layer DDoS attacks mitigated by Imperva Incapsula services during Q4 2017. In Q4, the number of application layer attacks nearly doubled, just as the number of network layer assaults declined. In both cases, […]
TrickBot Banking Trojan Gets Screenlocker Component
The most recent version of the TrickBot banking trojan now includes a screenlocker component, suggesting the malware’s operators might soon start holding victims for ransom if infected targets don’t appear to be e-banking users. The good news is that the screenlocker mechanism is not fully functional just yet, and appears […]
New York Clinic Goes to Paper Charting After Ransomware Infects System
New York Medical Facility Riddled with Ransomware Finger Lakes Health, of Geneva, New York was infected with an unknown ransomware variant on March 18, 2018. Therefore, the medical facility’s systems were left completely encrypted, with an unknown third-party demanding a ransom payment. The amount of the payment has not been […]
AMD will release the patches for the recently discovered flaws very soon
AMD concluded its investigation on the vulnerabilities recently discovered by CTS Labs and announced that security patches will be released very soon. AMD has finally acknowledged 13 critical vulnerabilities and exploitable backdoors in its Ryzen and EPYC processors that were first disclosed earlier March by the researchers at the security firm CTS […]
New R2D2 Technique Protects Files Against Wiper Malware
Purdue University scientists have developed a data protection technique called Reactive Redundancy for Data Destruction (R2D2) that can protect data sitting inside a virtual machine from modern data-wiping malware and even some secure file deletion methods. Researchers say the new technique was successful in preventing wiper malware such as Shamoon (v1 and […]
Prilex ATM Malware Modified to Clone Chip-and-Pin Payment Cards
It is just another day with just another ATM malware targeting unsuspecting users – This time, the malware comes with cloning capabilities. According to the findings of Kaspersky Lab researchers, an old point-of-sale malware program Prilex has now been transformed into a full-fledged tool suite that allows cyber-crooks steal PIN card and […]
Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers
Legitimate and large-scale cryptocurrency mining operations often invest in dedicated hardware and electric consumption to make a profit. This doesn’t escape the attention of cybercriminals: Malicious cryptocurrency mining was so pervasive last year that it was the most detected network event in devices connected to home routers. Through our incident response-related monitoring, we observed intrusion attempts […]