Hackers are using SSH brute-force attacks to take over Linux systems secured with weak passwords and are deploying a backdoor named Chaos. Attacks with this malware have been spotted since June, last year. They have been recently documented and broken down in a GoSecure report. Chaos rooted in 2013 sebd rootkit […]
Hacking
Banking Nightmare: Chase Glitch Gives Online Access to Random People
Have you ever wondered what would happen if hackers got into your bank account? What if YOUR BANK ITSELF let someone into your account? While hackers may be scary, the scarier prospect is your bank’s online system allowing access to random people. As of this afternoon, that’s actually what happened […]
Hackers spread Android spyware through Facebook using Fake profiles
The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almost 2 billion monthly active users on the social media giant Facebook and that makes it one of the most lucrative targets for hackers […]
Des hackers peuvent infiltrer les comptes Tinder avec un simple numéro de téléphone
Votre vie sentimentale n’a peut-être tenu qu’à la bonne volonté d’un hacker pendant un moment. Un informaticien a dévoilé une faille importante sur Tinder. Elle a depuis été corrigée. Si on vous demandait le type d’applications que vous n’avez pas forcément envie de voir tomber entre les mains d’un pirate, […]
SamSam Ransomware Hits Colorado DOT, Agency Shuts Down 2,000 Computers
The Colorado Department of Transportation (DOT) has shut down over 2,000 computers after some systems got infected with the SamSam ransomware on Wednesday, February 21. The agency’s IT staff is working with its antivirus provider McAfee to remediate affected workstations and safeguard other endpoints before before reintroducing PCs into its […]
Cisco Unity Connection Mail Relay Vulnerability
A vulnerability in the SMTP relay of Cisco Unity Connection could allow an unauthenticated, remote attacker to send unsolicited email messages. The vulnerability is due to improper handling of domain information in the affected software. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted requests to the targeted […]
Hack the Air Force: A Ton of Vulnerabilities Found in the US Air Force Cybersecurity System
Cyber world is a risky business. On one side it has made our life easier, and on other it presents risks. Everything on the cloud can be hacked, and no institution is 100% sade, including government organizations. HackerOne, an ethical hacking company and security research firm, hosted an event in […]
5 Ways Hackers Can Breach Your Company Undetected
5 Ways Hackers Can Breach Your Company Undetected Security breaches are, quite unfortunately, a common presence in corporate environments. Even companies making effective use of the most recent security solutions such as next generation firewalls, advanced threat protection and security incident and event management (SIEM) systems are not an exception. […]
NEW BEC SPAM CAMPAIGN TARGETS FORTUNE 500 BUSINESSES
Researchers have identified a wave of new business email compromise campaigns targeting Fortune 500 companies that are designed to trick victims into fraudulent wire transfers. Researchers said the campaigns originate from Nigeria and are targeting companies in the retail, healthcare and financial markets. The Nigerian-based business email compromise (BEC) campaigns […]
OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers
In preparation for our talk entitled “IoT: Battle of Bots” at the RootedCon Security conference that will be held in Madrid, Spain this March 2018, the FortiGuard Labs team encountered yet another new Mirai variant. Since the release of the source code of the Mirai botnet, FortiGuard Labs has seen a number […]