Threat Level as of May 2019

MS ISAC Last Mnt Alert Level May 2019

In Q1 2019 the MS-ISAC observed a 36% decrease in the quantity of reported breaches when compared to the previous quarter and 80% decrease year to year. The significant decrease from year to year is attributed to the absence of third-party breaches affecting multiple educational entities. The education sector experienced the most breaches, accounting for 55% of the breaches in Q1. The most prolific vectors in Q1 were misconfigured servers and phishing, accounting for a combined 44% of identified breaches.

MS ISAC Last Mnt Alert Map May 2019

"Knowledge about your enemies will help you win. Thus, treat threat intelligence with the respect it deserves and use it to protect your organization from all the relevant adversaries."

- How to Collect, Refine, Utilize and Create Threat Intelligence, October 2016, Gartner

Are you living in a SMART HOME?

SMART HOMES based on the IoT (Internet of Things - Amazon Alexa, Google Siri, Ring Doorbell etc) provide comfort & convenient management of our complicated life, however, SMART HOMES are also the largest threat to our privacy and risk of identity theft --

RSS Threats with IoTs

RSS IoT For All

  • Design Practices: AWS IoT Solutions July 18, 2019
    The post Design Practices: AWS IoT Solutions appeared first on IoT For All The Internet of Things (IoT) presents an unparalleled opportunity for every industry to address their business challenges. With the proliferation of devices, one needs a solution to connect, collect, store and analyze the devices’ data. Amazon Web Services provides various services that […]
  • 3 Ways IoT Will Change Our Personal Finances July 18, 2019
    The post 3 Ways IoT Will Change Our Personal Finances appeared first on IoT For All Connected networks and shared data will change our daily reality, including our personal finances. IoT will bring about countless advances in the world of personal finances to make our experiences safer, customized and smarter. The post 3 Ways IoT […]
  • Podcast E035 | What Role Does Artificial Intelligence Play in IoT? | Dr. Roger Brooks, Chief Scientist at Guavus July 17, 2019
    The post Podcast E035 | What Role Does Artificial Intelligence Play in IoT? | Dr. Roger Brooks, Chief Scientist at Guavus appeared first on IoT For All On this IoT For All podcast episode, Dr. Roger Brooks, Chief Scientist at Guavus, defines artificial intelligence (AI), Machine Learning (ML) and Machine Intelligence (MI) and how each […]
  • With an IoT Data Flood Incoming, Businesses Must Prepare Now July 17, 2019
    The post With an IoT Data Flood Incoming, Businesses Must Prepare Now appeared first on IoT For All Today's businesses are data-obsessed. With the rapid growth of the IoT that appears to be in the cards and the explosion of data that's going to come with it, it looks like many companies haven't done nearly […]
  • IoT Solutions World Congress announces the ten Testbeds for its edition this October July 17, 2019
    The post IoT Solutions World Congress announces the ten Testbeds for its edition this October appeared first on IoT For All IoTSWC announced the 10 leading technology companies who will participate in their Test Bed displaying their solutions this October. The post IoT Solutions World Congress announces the ten Testbeds for its edition this October […]

NIST National Vulnerabilty Database

Search the NIST database for a known vulnerability now ---

RSS National Vulnerability Database

  • CVE-2019-13951 (gdnsd) July 18, 2019
    The set_ipv4() function in zscan_rfc1035.rl in gdnsd 3.2.0 has a stack-based buffer overflow via a long and malformed IPv4 address in zone data.
  • CVE-2019-13952 (gdnsd) July 18, 2019
    The set_ipv6() function in zscan_rfc1035.rl in gdnsd 3.2.0 has a stack-based buffer overflow via a long and malformed IPv6 address in zone data.
  • CVE-2019-13948 (syguestbook_a5) July 18, 2019
    SyGuestBook A5 Version 1.2 allows stored XSS because the isValidData function in include/functions.php does not properly block XSS payloads, as demonstrated by a crafted use of the onerror attribute of an IMG element.
  • CVE-2019-13949 (syguestbook_a5) July 18, 2019
    SyGuestBook A5 Version 1.2 has no CSRF protection mechanism, as demonstrated by CSRF for an index.php?c=Administrator&a=update admin password change.
  • CVE-2019-13950 (syguestbook_a5) July 18, 2019
    index.php?c=admin&a=index in SyGuestBook A5 Version 1.2 has stored XSS via a reply to a comment.
  • CVE-2019-13575 (everest_forms) July 18, 2019
    A SQL injection vulnerability exists in WPEverest Everest Forms plugin for WordPress through 1.4.9. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via includes/evf-entry-functions.php
  • CVE-2019-1010096 (domainmod) July 18, 2019
    domainmod(https://domainmod.org/) domainmod v4.10.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: There is a CSRF vulnerability that can change the read-only user to admin. The component is: http://127.0.0.1/admin/users/edit.php?uid=2. The attack vector is: After the administrator logged in, open the html page.
  • CVE-2019-1010095 (domainmod) July 18, 2019
    domainmod(https://domainmod.org/) domainmod v4.10.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: There is a CSRF vulnerability that can add the administrator account. The component is: http://127.0.0.1/admin/users/add.php. The attack vector is: After the administrator logged in, open the html page.
  • CVE-2019-1010094 (domainmod) July 18, 2019
    domainmod v4.10.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: There is a CSRF vulnerability that can change admin password. The component is: http://127.0.0.1/settings/password/ http://127.0.0.1/admin/users/add.php http://127.0.0.1/admin/users/edit.php?uid=2. The attack vector is: After the administrator logged in, open the html page.
  • CVE-2019-1010054 (dolibarr) July 18, 2019
    Dolibarr 7.0.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: allow malitious html to change user password, disable users and disable password encryptation. The component is: Function User password change, user disable and password encryptation. The attack vector is: admin access malitious urls.

RSS National Vulnerability Database

  • CVE-2019-7956 July 18, 2019
    Adobe Dreamweaver direct download installer versions 19.0 and below, 18.0 and below have an Insecure Library Loading (DLL hijacking) vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user.
  • CVE-2019-7850 July 18, 2019
    Adobe Campaign Classic version 18.10.5-8984 and earlier versions have a Command injection vulnerability. Successful exploitation could lead to Arbitrary Code Execution in the context of the current user.
  • CVE-2019-7953 July 18, 2019
    Adobe Experience Manager version 6.4 and ealier have a Cross-Site Request Forgery vulnerability. Successful exploitation could lead to Sensitive Information disclosure in the context of the current user.
  • CVE-2019-7954 July 18, 2019
    Adobe Experience Manager version 6.4 and ealier have a Stored Cross-site Scripting vulnerability. Successful exploitation could lead to Sensitive Information disclosure in the context of the current user.
  • CVE-2019-7848 July 18, 2019
    Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Inadequate access control vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
  • CVE-2019-7941 July 18, 2019
    Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Information Exposure Through an Error Message vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
  • CVE-2019-7847 July 18, 2019
    Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Improper Restriction of XML External Entity Reference ('XXE') vulnerability. Successful exploitation could lead to Arbitrary read access to the file system in the context of the current user.
  • CVE-2019-7846 July 18, 2019
    Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Improper error handling vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
  • CVE-2019-7843 July 18, 2019
    Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Insufficient input validation vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
  • CVE-2019-7963 July 18, 2019
    Adobe Bridge CC version 9.0.2 and earlier versions have an out of bound read vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.

RSS Tenable Product Security Advisories

  • [R2] Nessus 8.5.0 Fixes Multiple Vulnerabilities June 25, 2019
    Nessus versions 8.4.0 and earlier were found to contain multiple XSS vulnerabilities due to improper validation of user-supplied input. For CVE-2019-3961, an unauthenticated, remote attacker could exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session.
  • [R1] Nessus Agent 7.4.0 Fixes One Third-party Vulnerability May 14, 2019
    Nessus Agent leverages third-party software to help provide underlying functionality. One of the third-party components (OpenSSL) was found to contain a single vulnerability, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled library to address the potential impact of […]
  • [R1] Nessus 8.3.0 Fixes Multiple Third-party Vulnerabilities March 26, 2019
    Nessus leverages third-party software to help provide underlying functionality. Two separate third-party components (OpenSSL and Moment.js) were found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues […]
  • [R1] Nessus 8.2.2 Fixes One Vulnerability January 30, 2019
    Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session.
  • [R1] Nessus 7.1.4 Fixes Multiple Third-party Vulnerabilities December 20, 2018
    Nessus leverages third-party software to help provide underlying functionality. One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues in Nessus. Nessus […]
  • [R1] Nessus 8.1.1 Fixes Multiple Third-party Vulnerabilities December 20, 2018
    Nessus leverages third-party software to help provide underlying functionality. One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues in Nessus. Nessus […]
  • [R2] SecurityCenter 5.8.0 Fixes Multiple Third-Party Vulnerabilities November 6, 2018
    SecurityCenter leverages third-party software to help provide underlying functionality. Two separate third-party components (Apache Xalan and Serializer) were found to contain vulnerabilities, and updated versions have been made available by the providers.
  • [R1] Nessus 8.0.0 Fixes Multiple Third-party Vulnerabilities October 23, 2018
    Nessus leverages third-party software to help provide underlying functionality. One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues in Nessus. Nessus […]
  • [R1] LCE 5.1.1 Fixes Multiple Third-party Vulnerabilities October 23, 2018
    Log Correlation Engine leverages third-party software to help provide underlying functionality. One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues in […]
  • [R1] SecurityCenter 5.7.1 Fixes Multiple Third-Party Vulnerabilities September 12, 2018
    SecurityCenter leverages third-party software to help provide underlying functionality. Two separate third-party components (PHP and OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues […]

RSS The State of Security

  • Thousands of NHS computers are still running Windows XP from beyond the grave July 18, 2019
    Two years after the WannaCry ransomware outbreak shone a light on the computer security of the UK’s National Health Service, and five years after Microsoft said it would no longer release patches for Windows XP, the NHS still has 2,300 PCs running the outdated operating system. The worrying statistic came to light in the response to a parliamentary question […]
  • Microsoft Observed Nation-State Attacks Targeting 10,000 of Its Customers July 18, 2019
    Microsoft has notified approximately 10,000 of its customers that they were the targets of nation-state attacks over the past year. On 17 July, Microsoft’s Corporate Vice President of Customer Security & Trust Tom Burt revealed that 84 percent of those attacks had targeted the tech giant’s enterprise customers. The remaining 16 percent of campaigns went […]
  • Multi-Cloud Security Best Practices Guide July 18, 2019
    A multi-cloud network is a cloud network that consists of more than one cloud services provider. A straightforward type of multi-cloud network involves multiple infrastructure as a service (IaaS) vendors. Can you use AWS and Azure together? For example, you could have some of your cloud network’s servers and physical network provided by Amazon Web […]
  • Communication – The Forgotten Security Tool July 18, 2019
    Security professionals have many tools in their toolbox. Some are physical in nature. (WireShark, Mimikatz, endpoint detection and response systems and SIEMs come to mind.) Others not so much. (These assets include critical thinking faculties, the ability to analyze complex processes, a willingness—some call it a need—to dig in and find the root cause of […]
  • Ransomware Attack Disrupts Some Services at Onondaga County Libraries July 17, 2019
    A crypto-ransomware attack has disrupted some services at all library locations across Onondaga County in New York State. On 16 July, the Onondaga County Public Library system published a tweet in which it explained that many of its public services were unavailable. 07/16/19 UPDATE: Library services continue to be unavailable. We apologize for the frustration, […]
  • Back to Basics: Infosec for Small and Medium-Sized Businesses July 17, 2019
    Too many small and medium-sized businesses (SMBs) are under the belief that purchasing “This One Product” or “This One Managed Service” will provide all the security their network requires. If this were true, large corporations with huge IT budgets would never have data breaches! Before you start buying expensive new technology to protect your office […]
  • Evite Reveals Security Incident Potentially Involving Unauthorized Access July 16, 2019
    Social-planning website Evite has revealed a security incident that potentially involved unauthorized access to its systems. Evite first became aware of the security incident back in April 2019. It responded by retaining a data forensics firm to launch a thorough investigation into the event. This effort uncovered malicious activity that had been present on its […]
  • Open Invitation to Help Develop Infosec Community Resources July 16, 2019
    It may be possible to democratize security by making it more accessible to average companies through community resources. We have an idea or two but we would appreciate your thoughts. At the 2019 RSA conference, Matt Chiodi, Chief Security Officer of Palo Alto Networks stated: “… small organizations are using on average between 15 and […]
  • Free Decryptor Released for Ims00rry Ransomware July 15, 2019
    Security researchers have released a free decryption utility which victims of Ims00rry ransomware can use to recover their files. On 12 July, anti-virus and anti-malware solutions provider Emsisoft made the decryptor available to the public. The firm published a follow-up post about is tool two days later. In its research, Emsisoft explains that Ims00rry leverages […]
  • Climbing the Vulnerability Management Mountain: Gearing Up and Taking Step One July 15, 2019
    As I discussed in the first blog in this series, the purpose of this series is to guide you on your journey up the Vulnerability Management Mountain (VMM). Like climbing a mountain, there is a lot of planning and work required, but when you get to the top, the view is amazing and well worth […]

RSS Attacks!

RSS Network Threats

RSS Mobile Device Threats

RSS Threats From Malware

RSS Threats to Data

RSS Cloud Threats

RSS Executive Decisions

RSS Security Strategy

  • 6 Key Enterprise Cyber Security Trends and Predictions July 16, 2019
    Have you ever wondered, in regards to cyber security, where your organization aligns with your competitors or even amongst enterprise organizations as a whole? Do they face the same threat vectors, pl...
  • Cyber Security Talent Still A Major Pain July 10, 2019
    There are many theories around the talent gap in cyber security – some say there is a talent shortage, some say there is a skills gap, and others believe recruiters and/or those hiring don’t know what...
  • Cyber Security Mid-Year Snapshot 2019 July 9, 2019
    Cyber Security Hub fielded a survey to subscribers in May 2019 to benchmark what has happened so far in the first six months of the year and what is expected in the next six. This mid-year checkpoint...
  • 6 Cyber Security Trends To Watch Going Into 2020 July 9, 2019
    In May 2019, Cyber Security Hub surveyed executives to see if their challenges and focuses have changed half way through the year. With the ability to benchmark these results to a previous survey (Nov...
  • Utilizing Cyber Security Standards And Frameworks July 8, 2019
    After establishing a risk assessment as the foundation for a cyber security program, many enterprises then turn to a control framework or set of standards to help streamline processes and reduce costs...
  • Cyber Security Headlines Of 2019 Bring Lessons Learned July 3, 2019
    In many recent interviews and cyber security coverage, Equifax, Cambridge Analytica and just about any Facebook headline always tops the list of most referenced cyber security breaches to note. Here a...
  • Preparing For Battle: Building An Incident Response Plan June 28, 2019
    In this age of rapidly evolving IT and emerging cyber threats, any organization that interfaces with sensitive data needs to detect and respond quickly to security incidents.
  • The Case For Stronger Cyber Security Efforts In APAC May 29, 2019
    APAC’s cyber risk becomes more increased as digitalization is on the rise in combination with users who are unaware of threats including viruses, phishing or malware.
  • Understanding The Threats That Come With The IoT May 27, 2019
    According to Gartner, 8.4 billion connected “things” were in use last year. Although these devices bring convenience and ease, they also significantly expand the attack surface. Cyber criminals are al...
  • Taking Advantage Of AI In Cyber Security Strategies May 22, 2019
    There is no shortage of new and modern technologies entering the market that display the potential to change cyber security as we know it. For example, artificial intelligence and machine learning hav...

RSS InfoSecurity Magazine

RSS Application and Cybersecurity Blog

  • Cloudflare Denial of Service (DoS) Blackout: The case for expert-driven pen testing July 15, 2019
    Last Friday, Cloudflare posted a detailed blog post that described about how a poorly implemented software deployment caused a massive CPU spike, rendering the Cloudflare service unavailable. Because Cloudflare servers couldn’t handle incoming HTTP requests, global customer websites were unavailable for approximately 30 minutes.[1]
  • Wrapping Up Hot Dogs & Hacking July 9, 2019
    Hot Dogs & Hacking is a wrap, and we are blown away by the number of people who spent time away from the beach and cookouts to attack our Shred Cyber Range. In the past we’ve highlighted top scorers and the occasional person who solves all of the challenges, but this time we have to […]
  • Run Your Own Cyber Range Event July 1, 2019
    When we announced the Hot Dogs & Hacking event currently taking place, we highlighted the value of feedback provided by our ever growing community. The wealth of good ideas allow us to constantly improve our Cyber Ranges while adding more to the mix like we recently did with LetSee. And as good as our Cyber […]
  • Get Ready for Hot Dogs & Hacking! June 27, 2019
    We love feedback! Luckily, the security community errs on the side of collaboration, resulting in constructive, helpful feedback whenever it is requested - and often even when it’s not. From a company perspective this is great since we know exactly what our customers are thinking at most times. From a Cyber Range product perspective it's […]
  • Getting Started with Local Security Groups June 24, 2019
    For several months we have been profiling experienced security practitioners as well as those still getting started. Our reasoning is simple - there is no one surefire way to gain the experience and knowledge necessary to thrive in the world of cybersecurity. Nearly everyone has a different path - some are PhDs while others barely […]

RSS Naked Security

RSS Cyber security updates

RSS Cyber Security

  • Best Labs or Simulators for free to practice cyber security scenarios? July 17, 2019
    Hi I am still fairly new to the cybersecurity field. I was wondering if anyone might have any simulators or software that could be used for free to practice different scenarios with cyber security where I can learn some things and gain experience. I'm looking to get my net + and Security + as well […]
  • Are there public breach bounty programs out there for data breach hunters? July 15, 2019
    There are plenty of bug bounty programs out there where a company will pay a good chunk of money if you find a bug in their system, which could also include if you inform them of a potential open server somewhere that has data that they would want secured (user databases, etc). But are there […]
  • Two questions I had for cyber security field July 11, 2019
    Hi I am still fairly new to the cybersecurity field. I was wondering if anyone might have any simulators or software that could be used for free to practice different scenarios with cyber security where I can learn some things and gain experience. I'm looking to get my net + and Security + as well […]
  • Paid Training Sites Are a Good Resource to Move Past the Beginner Level of Programming? July 5, 2019
    Hello all, ​ Trying to be respectful of this subreddit's rules and carefully construct this thread so that it's not another shitpost asking for career advice. I'm just past the beginner level of programming and am therefore finding that the majority of free resources on YouTube is no longer useful. I know someone on this […]
  • Blazefire malware June 30, 2019
    submitted by /u/honghuac [link] [comments]
  • Continued password cracking attempts on my Wife's blog June 27, 2019
    Hey all, My wife has a WordPress food blog she runs (I help out with the IT stuff she doesnt understand) I have Wordfence running on it which does a pretty good job, however I have noticed that there has been continued attempts to login with an admin user from a AWS machine. It always […]
  • Hackers Steal 500 MB of NASA Data Using Cheap Raspberry Pi Computer June 23, 2019
    submitted by /u/FederalTeam [link] [comments]
  • Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange June 23, 2019
    submitted by /u/FederalTeam [link] [comments]
  • Interview Advice June 11, 2019
    Hi, So basically I am about to take some interviews for basic entry level positions such as Security Analyst, Pentester, and Security Consulting and I was wondering if Leetcode premium is worth to get for interview prep just like it helps devs prep for interviews or if there is something similar please let me know? […]
  • Looking to quickly interview someone in the Cybersecurity/Information Security and Assurance field June 10, 2019
    Hi, I'm a freshman in college and as of right now I'm undecided as to what to study. In one of my classes, to help determine my major, I've been given an assignment to interview an individual in our current field of interest, but I don't know anyone currently with a job in cybersecurity/ISA. I […]

RSS Cyber Attacks, Cyber Crime and Cyber Security

RSS Krebs on Security

  • Party Like a Russian, Carder’s Edition July 17, 2019
    KrebsOnSecurity has seen some creative yet truly bizarre ads for cybercrime services in the underground, but the following animated advertisement for a popular credit card fraud shop likely takes the cake.
  • Meet the World’s Biggest ‘Bulletproof’ Hoster July 16, 2019
    For at least the past decade, a computer crook variously known as "Yalishanda," "Downlow" and "Stas_vl" has run one of the most popular "bulletproof" Web hosting services catering to a vast array of phishing sites, cybercrime forums and malware download servers. What follows are a series of clues that point to the likely real-life identity […]
  • Is ‘REvil’ the New GandCrab Ransomware? July 15, 2019
    The cybercriminals behind the GandCrab ransomware-as-a-service (RaaS) offering recently announced they were closing up shop and retiring after having allegedly earned more than $2 billion in extortion payments from victims. But a growing body of evidence suggests the GandCrab team have instead quietly regrouped behind a more exclusive and advanced ransomware program known variously as […]
  • FEC: Campaigns Can Use Discounted Cybersecurity Services July 11, 2019
    The U.S. Federal Election Commission (FEC) said today companies can offer discounted cybersecurity services to political campaigns without running afoul of existing campaign finance laws, provided they already do the same for other non-political entities. The decision comes amid much jostling on Capitol Hill over election security at the state level, and fresh warnings from […]
  • Patch Tuesday Lowdown, July 2019 Edition July 9, 2019
    Microsoft today released software updates to plug almost 80 security holes in its Windows operating systems and related software. Among them are fixes for two zero-day flaws that are actively being exploited in the wild, and patches to quash four other bugs that were publicly detailed prior to today, potentially giving attackers a head start […]
  • Who’s Behind the GandCrab Ransomware? July 8, 2019
    The crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were terminating the program after allegedly having earned more than $2 billion in extortion payouts from victims. What follows is a deep dive into who may be responsible for recruiting new […]
  • Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers June 28, 2019
    It might be difficult to fathom how this isn't already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Microsoft Azure and Office365 accounts to use multi-factor authentication. The move comes amid a noticeable uptick in phishing and malware attacks targeting CSP employees and contractors.
  • Breach at Cloud Solution Provider PCM Inc. June 27, 2019
    A digital intrusion at PCM Inc., a major U.S.-based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company's clients, KrebsOnSecurity has learned.
  • Tracing the Supply Chain Attack on Android June 25, 2019
    Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn't exactly name those responsible, but said it believes the offending vendor uses the nicknames "Yehuo" or "Blazefire." What follows is a deep dive into the […]
  • Collections Firm Behind LabCorp, Quest Breaches Files for Bankruptcy June 20, 2019
    A medical billing firm responsible for a recent eight-month data breach that exposed the personal information on nearly 20 million Americans has filed for bankruptcy, citing "enormous expenses" from notifying affected consumers and the loss of its four largest customers.

RSS McAfee Blogs

  • Black Hat 2019: Q&A with McAfee July 18, 2019
    Now in its 22nd year, Black Hat is an information security event showcasing the latest research, newest technology, scariest threats, and biggest trends. Around 19,000 security professionals will be taking over Las Vegas’s Mandalay Bay during the six-day event. Before the security world convenes the first week in August, I spoke with McAfee leadership and […]
  • Downloaded FaceApp? Here’s How Your Privacy is Now Affected July 18, 2019
    If you’ve been on social media recently, you’ve probably seen some people in your feed posting images of themselves looking elderly. That’s because FaceApp, an AI face editor that went viral in 2017, is making a major comeback with the so-called FaceApp Challenge — where celebrities and others use the app’s old age filter to […]
  • How to Spot Phishing Lures July 18, 2019
    Phishing attacks, in which scammers try to trick you out of your private information or money, are one of the most prevalent threats we see today. Part of the problem is that the cybercriminals have numerous ways in which to hook you, either online, over the phone, or even in person. In today’s busy world […]
  • Data Privacy and Security Risks in Healthcare July 18, 2019
    Healthcare is a business much like all verticals I work with; however, it has a whole different set of concerns beyond those of traditional businesses. The compounding threats of malware, data thieves, supply chain issues, and the limited understanding of security within healthcare introduces astronomical risk. Walking through a hospital a few weeks ago, I […]
  • McAfee ATR Aids Police in Arrest of the Rubella and Dryad Office Macro Builder Suspect July 17, 2019
    Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal sender tries to entice a victim to open the document and enable the embedded macro. This macro then proceeds to pull in a whole array of nastiness and infect a victim’s machine. […]
  • Could a Dropped USB Drive Expose You to Malware? July 16, 2019
    USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer. So If you spot a USB drive sitting on the ground or in your office, should you assume someone lost their files? Or is it a hacker baiting you into compromising your computer and network? […]
  • Could a Dropped USB Drive Expose You to Malware? July 16, 2019
    USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer. So If you spot a USB drive sitting on the ground or in your office, should you assume someone lost their files? Or is it a hacker baiting you into compromising your computer and network? […]
  • Cybersecurity Hygiene: 8 Steps Your Business Should be Taking July 16, 2019
    Whether you’re managing your enterprise’s cybersecurity or you’ve outsourced it to a service provider, you’re ultimately the one that will be held accountable for a data breach. If your vendor loses your data, your customers and board of directors will likely still hold you responsible. McAfee’s recent report, Grand Theft Data II: The Drivers and […]
  • Family Safety: Twitter, Instagram Beef Up Measures to Fight Hate Speech, Bullying July 15, 2019
    The past few weeks have proven to be wins for family safety with several top social networks announcing changes to their policies and procedures to reduce the amount of hateful conduct and online bullying. Twitter: ‘Dehumanizing Language Increases Risk’ In response to rising violence against religious minorities, Twitter said this week that it would update […]
  • Ready, Set, Shop: Enjoy Amazon Prime Day Without the Phishing Scams July 15, 2019
    Amazon Prime Day is becoming one of the hottest shopping periods for the summer. However, it is also becoming one of the hottest opportunities for cybercriminals, as hackers target shoppers in a number of ways during peak shopping moments to steal personal data or financial information. In fact, researchers at McAfee Labs have uncovered a phishing […]

RSS WeLiveSecurity

  • Okrum: Ke3chang group targets diplomatic missions July 18, 2019
    Tracking the malicious activities of the elusive Ke3chang APT group, ESET researchers have discovered new versions of malware families linked to the group, and a previously unreported backdoor The post Okrum: Ke3chang group targets diplomatic missions appeared first on WeLiveSecurity
    Zuzana Hromcová
  • BlueKeep patching isn’t progressing fast enough July 17, 2019
    Keeping up with BlueKeep; or how many internet-facing systems, and in which countries and industries, remain ripe for exploitation? The post BlueKeep patching isn’t progressing fast enough appeared first on WeLiveSecurity
    Tomáš Foltýn
  • How your Instagram account could have been hijacked July 16, 2019
    A researcher found that it was possible to subvert the platform’s password recovery mechanism and take control of user accounts The post How your Instagram account could have been hijacked appeared first on WeLiveSecurity
    Tomáš Foltýn
  • Week in security with Tony Anscombe July 12, 2019
    ESET researchers describe the ins and outs of a zero-day exploit that has been used for a highly targeted attack and reveal the name of the threat actor that deployed it The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
    Tomáš Foltýn
  • Cybercrime seen to be getting worse: The time to act is now July 12, 2019
    What mounting public concern about falling victim to cybercrime says about government and corporate efforts at cybercrime deterrence The post Cybercrime seen to be getting worse: The time to act is now appeared first on WeLiveSecurity
    Stephen Cobb
  • Buhtrap group uses zero‑day in latest espionage campaigns July 11, 2019
    ESET research reveals notorious crime group also conducting espionage campaigns for the past five years The post Buhtrap group uses zero‑day in latest espionage campaigns appeared first on WeLiveSecurity
    Jean-Ian Boutin
  • Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks July 10, 2019
    ESET research discovers a zero-day exploit that takes advantage of a local privilege escalation vulnerability in Windows The post Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks appeared first on WeLiveSecurity
    Anton Cherepanov
  • UK’s data watchdog hands out two mega‑fines for breaches July 9, 2019
    The times they have a-changed since the ICO could only slap fines worth a fraction of the current amounts The post UK’s data watchdog hands out two mega‑fines for breaches appeared first on WeLiveSecurity
    Tomáš Foltýn
  • Malicious campaign targets South Korean users with backdoor‑laced torrents July 8, 2019
    ESET researchers have discovered a malicious campaign distributing a backdoor via torrents, with Korean TV content used as a lure The post Malicious campaign targets South Korean users with backdoor‑laced torrents appeared first on WeLiveSecurity
    Zuzana Hromcová
  • Week in security with Tony Anscombe July 5, 2019
    Chinese smart home solutions provider Orvibo has leaked two billion logs from devices managed via its cloud platform, exposing sensitive information about their users The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
    Tomáš Foltýn

RSS We Live CyberSecurity Feed

  • Okrum: Ke3chang group targets diplomatic missions July 18, 2019
    Tracking the malicious activities of the elusive Ke3chang APT group, ESET researchers have discovered new versions of malware families linked to the group, and a previously unreported backdoor The post Okrum: Ke3chang group targets diplomatic missions appeared first on WeLiveSecurity
  • BlueKeep patching isn’t progressing fast enough July 17, 2019
    Keeping up with BlueKeep; or how many internet-facing systems, and in which countries and industries, remain ripe for exploitation? The post BlueKeep patching isn’t progressing fast enough appeared first on WeLiveSecurity
  • How your Instagram account could have been hijacked July 16, 2019
    A researcher found that it was possible to subvert the platform’s password recovery mechanism and take control of user accounts The post How your Instagram account could have been hijacked appeared first on WeLiveSecurity
  • Week in security with Tony Anscombe July 12, 2019
    ESET researchers describe the ins and outs of a zero-day exploit that has been used for a highly targeted attack and reveal the name of the threat actor that deployed it The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
  • Cybercrime seen to be getting worse: The time to act is now July 12, 2019
    What mounting public concern about falling victim to cybercrime says about government and corporate efforts at cybercrime deterrence The post Cybercrime seen to be getting worse: The time to act is now appeared first on WeLiveSecurity
  • Buhtrap group uses zero‑day in latest espionage campaigns July 11, 2019
    ESET research reveals notorious crime group also conducting espionage campaigns for the past five years The post Buhtrap group uses zero‑day in latest espionage campaigns appeared first on WeLiveSecurity
  • Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks July 10, 2019
    ESET research discovers a zero-day exploit that takes advantage of a local privilege escalation vulnerability in Windows The post Windows zero‑day CVE‑2019‑1132 exploited in targeted attacks appeared first on WeLiveSecurity
  • UK’s data watchdog hands out two mega‑fines for breaches July 9, 2019
    The times they have a-changed since the ICO could only slap fines worth a fraction of the current amounts The post UK’s data watchdog hands out two mega‑fines for breaches appeared first on WeLiveSecurity
  • Malicious campaign targets South Korean users with backdoor‑laced torrents July 8, 2019
    ESET researchers have discovered a malicious campaign distributing a backdoor via torrents, with Korean TV content used as a lure The post Malicious campaign targets South Korean users with backdoor‑laced torrents appeared first on WeLiveSecurity
  • Week in security with Tony Anscombe July 5, 2019
    Chinese smart home solutions provider Orvibo has leaked two billion logs from devices managed via its cloud platform, exposing sensitive information about their users The post Week in security with Tony Anscombe appeared first on WeLiveSecurity