Threat Level as of March 2020

MS ISAC Last Mnt Alert Level May 2019

On March 2020, the Cyber Threat Alert Level was evaluated and because of COVID-19 Pandemic, has been raised to "GUARDED" security levels.

Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

MS ISAC Last Mnt Hot Topics MAR2020 2
MS ISAC Last Mnt Hot Topics MAR2020 3
MS ISAC Last Mnt Hot Topics MAR2020
MS ISAC Last Mnt Alert Map May 2019

"Knowledge about your enemies will help you win. Thus, treat threat intelligence with the respect it deserves and use it to protect your organization from all the relevant adversaries."

- How to Collect, Refine, Utilize and Create Threat Intelligence, October 2016, Gartner

Are you living in a SMART HOME?

SMART HOMES based on the IoT (Internet of Things - Amazon Alexa, Google Siri, Ring Doorbell etc) provide comfort & convenient management of our complicated life, however, SMART HOMES are also the largest threat to our privacy and risk of identity theft --

RSS Threats with IoTs

RSS IoT For All

  • How Big Data and IoT Are Connected April 1, 2020
    The post How Big Data and IoT Are Connected appeared first on IoT For All Big Data and IoT are connected through a need for making sense of one another. They embrace connectivity, communication, and creating clear and actionable information for the end user. Whilst independent concepts, they work together favourably, as you will learn […]
  • Yonomi’s Kent Dickson | What does COVID-19 Mean for the Smart Home Landscape? March 31, 2020
    The post Yonomi’s Kent Dickson | What does COVID-19 Mean for the Smart Home Landscape? appeared first on IoT For All Kent Dickson, CEO and Co-Founder of Yonomi talks about the smart home industry, namely the state of the smart home landscape and how the COVID-19 pandemic could make-or-break progress for smart home companies. The […]
  • Hardware Threats to an IoT Ecosystem March 31, 2020
    The post Hardware Threats to an IoT Ecosystem appeared first on IoT For All The integrity of IoT hardware is paramount to the success of a solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. The post Hardware Threats to an IoT Ecosystem appeared first on IoT […]
  • Announcing The Things Virtual Conference – 24h Online LoRaWAN event March 31, 2020
    The post Announcing The Things Virtual Conference – 24h Online LoRaWAN event appeared first on IoT For All On 16th of April, The Things Conference goes online with a global 24h virtual event. Expect hands-on LoRaWAN workshops, device demonstrations, live coding sessions and AMAs with key people in the ecosystem. The post Announcing The Things […]
  • The Role of WiFi in IoT March 31, 2020
    The post The Role of WiFi in IoT appeared first on IoT For All The role of Wi-Fi in the IoT space is often overlooked. Wi-Fi 6 brings new features such as target wait time which will help devices conserve power, and prevent channel contention. In this article we make the case that Wi-Fi is […]

NIST National Vulnerabilty Database

Search the NIST database for a known vulnerability now ---

RSS National Vulnerability Database

  • CVE-2020-5391 (wp-auth0) April 1, 2020
    Cross-site request forgery (CSRF) vulnerabilities exist in the Auth0 plugin before 4.0.0 for WordPress via the domain field.
  • CVE-2020-6753 (login_by_auth0) April 1, 2020
    The Login by Auth0 plugin before 4.0.0 for WordPress allows stored XSS on multiple pages, a different issue than CVE-2020-5392.
  • CVE-2020-7947 (login_by_auth0) April 1, 2020
    An issue was discovered in the Login by Auth0 plugin before 4.0.0 for WordPress. It has numerous fields that can contain data that is pulled from different sources. One issue with this is that the data isn't sanitized, and no input validation is performed, before the exporting of the user data. This can lead to […]
  • CVE-2020-5392 (wp-auth0) April 1, 2020
    A stored cross-site scripting (XSS) vulnerability exists in the Auth0 plugin before 4.0.0 for WordPress via the settings page.
  • CVE-2020-7066 (php) April 1, 2020
    In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to […]
  • CVE-2020-7065 (php) April 1, 2020
    In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.
  • CVE-2020-7064 (php) April 1, 2020
    In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
  • CVE-2020-10696 (buildah, enterprise_linux, openshift_container_platform) March 31, 2020
    A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
  • CVE-2020-7009 (elasticsearch) March 31, 2020
    Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys. An attacker who is able to generate an API key can perform a series of steps that result in an API key being generated with elevated privileges.
  • CVE-2019-13495 (xgs2210-52hp_firmware) March 31, 2020
    In firmware version 4.50 of Zyxel XGS2210-52HP, multiple stored cross-site scripting (XSS) issues allows remote authenticated users to inject arbitrary web script via an rpSys.html Name or Location field.

RSS National Vulnerability Database

  • CVE-2020-8145 April 1, 2020
    The UniFi Video Server (Windows) web interface configuration restore functionality at the “backupâ€� and “wizardâ€� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP or CUSTOM_GROUP groups, can access these endpoints and overwrite the current application configuration. This can be abused for various purposes, including adding new administrative users. Affected […]
  • CVE-2020-8146 April 1, 2020
    In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the windows registry when installing UniFi-Video controller. Affected Products: UniFi […]
  • CVE-2020-8144 April 1, 2020
    The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware update information. If the version field contains ..\ character sequences, the […]
  • CVE-2020-6096 April 1, 2020
    An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined […]
  • CVE-2020-6009 April 1, 2020
    LearnDash WordPress plugin version below 3.1.6 is vulnerable to Unauthenticated SQL Injection.
  • CVE-2020-1958 April 1, 2020
    When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also […]
  • CVE-2020-11470 April 1, 2020
    Zoom Client for Meetings through 4.6.8 on macOS has the disable-library-validation entitlement, which allows a local process (with the user's privileges) to obtain unprompted microphone and camera access by loading a crafted library and thereby inheriting Zoom Client's microphone and camera access.
  • CVE-2020-11469 April 1, 2020
    Zoom Client for Meetings through 4.6.8 on macOS copies runwithroot to a user-writable temporary directory during installation, which allows a local process (with the user's privileges) to obtain root access by replacing runwithroot.
  • CVE-2019-17564 April 1, 2020
    Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
  • CVE-2018-11802 April 1, 2020
    In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such […]

RSS Tenable Product Security Advisories

  • [R1] SimpleSAMLPHP Stand-alone Patch Available for Tenable.sc versions 5.9.x to 5.12.x January 6, 2020
    Tenable.sc leverages third-party software to help provide underlying functionality. One of the third-party components (SimpleSAMLPHP) was found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to provide a stand-alone patch to address the potential impact of these issues in […]
  • [R1] Tenable.sc 5.13.0 Fixes Multiple Third-Party Vulnerabilities December 30, 2019
    Tenable.sc leverages third-party software to help provide underlying functionality. Three separate third-party components (OpenSSL, Apache HTTP Server, SimpleSAMLphp) were found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of […]
  • [R1] Nessus Network Monitor 5.11.0 Fixes Multiple Third-party Vulnerabilities December 19, 2019
    Nessus Network Monitor leverages third-party software to help provide underlying functionality. Several third-party components (OpenSSL, jQuery and moment.js) were found to contain vulnerabilities, and updated versions have been made available by the providers.
  • [R1] PHP Stand-alone Patch Available for Tenable.sc versions 5.7.x to 5.11.x November 4, 2019
    Tenable.sc leverages third-party software to help provide underlying functionality. One of the third-party components (PHP) was found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to provide a stand-alone PHP patch to address the potential impact of these issues […]
  • [R1] Nessus 8.7.0 Fixes One Vulnerability October 22, 2019
    Nessus versions 8.6.0 and earlier were found to contain a Denial of Service vulnerability due to improper validation of specific imported scan types. An authenticated, remote attacker could potentially exploit this vulnerability to cause a Nessus scanner to become temporarily unresponsive.
  • [R1] Nessus 8.6.0 Fixes One Vulnerability August 13, 2019
    Nessus versions 8.5.2 and earlier on Windows platforms were found to contain a flaw where certain files could be overwritten arbitrarily. An authenticated, remote attacker could potentially exploit this vulnerability to create a denial of service condition.
  • [R2] Nessus 8.5.0 Fixes Multiple Vulnerabilities June 25, 2019
    Nessus versions 8.4.0 and earlier were found to contain multiple XSS vulnerabilities due to improper validation of user-supplied input. For CVE-2019-3961, an unauthenticated, remote attacker could exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session.
  • [R1] Nessus Agent 7.4.0 Fixes One Third-party Vulnerability May 14, 2019
    Nessus Agent leverages third-party software to help provide underlying functionality. One of the third-party components (OpenSSL) was found to contain a single vulnerability, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled library to address the potential impact of […]
  • [R1] Nessus 8.3.0 Fixes Multiple Third-party Vulnerabilities March 26, 2019
    Nessus leverages third-party software to help provide underlying functionality. Two separate third-party components (OpenSSL and Moment.js) were found to contain vulnerabilities, and updated versions have been made available by the providers. Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of these issues […]
  • [R1] Nessus 8.2.2 Fixes One Vulnerability January 30, 2019
    Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session.

RSS The State of Security

  • VelvetSweatshop Technique Used by Attack Campaign to Deliver LimeRAT April 1, 2020
    An attack campaign leveraged the Excel VelvetSweatshop encryption technique to deliver samples of the LimeRAT malware family. According to Mimecast, those responsible for this attack campaign turned to VelvetSweatshop to enhance the efficacy of their efforts. Nefarious individuals have a history of using a password to encrypt malicious Excel spreadsheets. Doing so helps their attack […]
  • The MITRE ATT&CK Framework: Execution March 31, 2020
    Of all the tactics that an adversary will take on in their campaign, none will be more widely abused than Execution (https://attack.mitre.org/wiki/Execution). When taking into consideration off-the-shelf malware, traditional ransomware, or state-of-the-art advanced persistent threat actors, all of them have execution in common. There’s a great quote from Alissa Torres which says, “Malware can hide, […]
  • Are You Ready for the Remote Work’s Toll on Corporate Security? March 31, 2020
    Given the situation that many companies, organizations and government agencies have been forced into working remotely due to COVID-19, it is imperative to give some thought about corporate security. Using a VPN for New Stay-at-Home Workers Millions of employees are now working from the confines of their own homes in an effort to keep businesses […]
  • COVID-19 Scam Roundup – March 30, 2020 March 30, 2020
    Many in the digital security community are coming together to combat malicious actors during the coronavirus disease 2019 (COVID-19) global outbreak. One of the most visible of these new efforts is the COVID-19 CTI League. Made up of approximately 400 volunteers living in approximately 40 countries, the COVID-19 CTI League is working to block attackers […]
  • Mr and Mrs CISO: Security in the Age of the Lockdown March 30, 2020
    With so many of us frantically learning to juggle our roles as parents, workers and most recently teachers; is it just my wife and I who feel it necessary to monitor the online activity of our teenagers during this lockdown? Sure, there’s rich educational content out there, but it sits amongst social networks, streaming services, […]
  • Now Is the Time to Get up to Speed with CMMC and SP 800-171 Rev 2 March 30, 2020
    At the beginning of March 2020, Fifth Domain reported that Colorado-based aerospace, automotive and industrial parts manufacturer Visser Precision LLC had suffered a DoppelPaymer ransomware infection. Those behind this attack ultimately published information stolen from some of Visser’s customers. Those organizations included defense contractors Lockheed Martin, General Dynamics, Boeing and SpaceX. As the attack discussed […]
  • Tupperware Website Compromised with Credit Card Skimmer March 27, 2020
    Digital attackers compromised the website of kitchen and household products manufacturer Tupperware with a credit card skimmer. On March 20, researchers at Malwarebytes observed that attackers had compromised tupperware[.]com by hiding malicious code within an image file. This code activated when a user attempted to check out and complete their purchase on Tupperware’s online store. […]
  • Third-party data breach exposes GE employees’ personal information March 26, 2020
    Past and present employees of General Electric (GE) are learning that their sensitive information has been exposed by a data breach at a third-party service provider. Fortune 500 company GE says it was recently informed of a security breach at one of its partners, Canon Business Process Services. According to GE, between approximately February 3 […]
  • Industrial Entities in Middle East Targeted by WildPressure APT Operation March 26, 2020
    A newly detected advanced persistent threat (APT) operation called “WildPressure” targeted industrial organizations and other entities in the Middle East. Researchers at Kaspersky Lab observed WildPressue distributing samples of a fully operation trojan written in C++ called “Milum.” With timestamps dating back to March 2019, these samples didn’t share code or targets with any known […]
  • The Future is Hybrid: Practicing Security in the Hybrid Cloud March 26, 2020
    By now, many organizations have adopted the cloud in some way. We saw organizations moving whole servers over to the cloud at the beginning, but now we see small parts of a system being moved to the cloud and new cloud native offerings. We’ll use the analogies of Lincoln Logs and Legos to describe these […]

RSS Attacks!

RSS Network Threats

RSS Mobile Device Threats

  • Security Standards For 5G March 24, 2020
    Gartner predicts that the 5G enterprise IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.4 million units in 2021. By 2023, the enterprise 5...
  • RSAC2020: IoT Is Officially Part Of Enterprise Mobility March 6, 2020
    Risk that comes from mobile and IoT devices must be factored into the enterprise security program. Security leaders need to be looking at those risks holistically and strategically, rather than operat...
  • Email Phishing Overshadows Risk Of Mobile Malware January 2, 2020
    Like the mobile device’s counterpart, workstations and laptops, many loaded malware campaigns begin with phishing attempts. Cyber Security Hub developed a market report to explore the perceptions, cha...
  • Incident Of The Week: FaceApp Now Viral For Security Risks July 19, 2019
    FaceApp has become popular for its ability to take a photo of anyone’s face and age it, or transform its features. Developed by a Russian-based company, it has gone viral because many are questioning...
  • BYOD Rules And The Future Of Medical Data Security April 24, 2019
    Healthcare organizations have always been extremely attractive targets to cyber criminals, so the increasing use of personal or third party mobile devices highlights a need for the implementation of m...
  • Incident Of The Week: Group FaceTime Glitch Exposes Privacy Breach February 1, 2019
    According to The New York Times, on Jan. 19, a 14-year-old from Arizona discovered a glitch using FaceTime, Apple’s video chatting software — he could eavesdrop on his friend’s phone before his friend...
  • 5 Reasons To Use Biometrics To Secure Mobile Devices January 24, 2019
    It is no secret that mobile devices are under attack. From phishing scams to a host of other issues, mobile devices are increasingly seen as a vulnerability in the enterprise, and as an easy target fo...
  • 7 Mobile Security Bloggers To Follow January 15, 2019
    With new enterprise mobile device security threats and vulnerabilities being discovered on a frequent basis, it helps to read analysis from numerous industry leaders.
  • 11 Ways To Boost Your Mobile Device Security Now January 11, 2019
    Since mobile devices can represent an enormous security risk, enterprises need to be aware of every solution. Here are 11 initiatives from IQPC's Enterprise Mobility Exchange, to enhance mobile device...
  • Palo Alto Networks CSO Talks Risk Metrics, Algorithms & Automation October 30, 2018
    On the May 14 episode of “Task Force 7 Radio,” host George Rettas sat down with Palo Alto Networks CSO, Rick Howard, to outline risk management, the security kill-chain and much more.

RSS Threats From Malware

RSS Threats to Data

RSS Cloud Threats

RSS Executive Decisions

RSS Security Strategy

RSS InfoSecurity Magazine

RSS Application and Cybersecurity Blog

  • March Hackness 2020 Post Game Report March 27, 2020
    There’s no better way to put it - March Hackness 2020 was a slam dunk! The CMD+CTRL Cyber Range community shattered records of our previous quarterly events including most participants, most points scored, fastest time to solve all challenges (under 2 hours!) and many more. Many thanks to everyone that participated for choosing to spend […]
  • The Power of Community - PancakesCon 2020: Quarantine Edition March 25, 2020
    Like many industries, the cybersecurity community is full of smart, dedicated, and curious people that deliver surprising results in unusual times. When presented with unique circumstances and limitations, these minds start finding creative and innovative ways to not only maintain the norm, but often to advance it. There is no more recent and shining example […]
  • Profile of a Developer Turned Hacker March 19, 2020
    The struggle to find experienced Cybersecurity professionals is familiar to anyone who has tried to fill a team. With connected technology expanding at a rate far greater than can reasonably be secured, experienced professionals seemingly have swaths of opportunities from which to choose.  Fortunately, many Cybersecurity organizations understand that identifying and training less experienced talent […]
  • Start Stretching for March Hackness March 11, 2020
    As the days get warmer, the sun sets later, and birds chirp louder, the Security Innovation team has one more right of spring to get excited about - March Hackness! This year’s event is going to focus on one of the essential factors for rapidly growing cybersecurity skillsets - new users. To encourage the curiosity […]
  • Assessing Commercial Off-The-Shelf & 3rd-Party Software March 4, 2020
    Commercial off-the-shelf software (COTS) is a staple in today’s modern software development world. Not only does it extend solution features, but it gets them to users faster. However, it also introduces risks that can adversely impact the proper operation of your system or product and the information processed, stored, or transmitted by it - risks […]

RSS Naked Security

RSS Cyber security

RSS Cyber Security

  • Is the OkayFreedom Browser Extension malware? March 30, 2020
    So, Ive been using the VPN Okayfreedom because you can get a free subscription from some magazine or something once a year (Got it from a friend so idk). I dont have a question about the VPN itself but rather the browser extension that came with it. For a while I had the yellow triangle […]
  • Complete Libreswan IPSec Host-To-Host with RSA Keys Tutorial - Red Hat 8 March 21, 2020
    Learn how to configure Libreswan IPSec tunnels on Red Hat 8 System using RSA Keys to secure the communications between two Red Hat Hosts. Red Hat Security. https://www.certificationsnotes.com/libreswan-ipsec-host-to-host/ submitted by /u/poplabsec [link] [comments]
  • Mitigating information exposure March 19, 2020
    Hello and sorry to bother you. How am I supposed to minimize the information exposure on my computer or server besides using firewalls? If someone uses nmap or other tool to find info about my ports, how can I counter that? ​ Thank you in advance! submitted by /u/LightO88 [link] [comments]
  • Looking at COVID 19 in a security standpoint. March 18, 2020
    So looking at the affect COVID 19 is having on society. Do we now need to implement plans for a pandemic into a DRP? This is just a random thought I had driving home from work. submitted by /u/Cyber_Insight [link] [comments]
  • HELP! Ideas for Cybersecurity Solutions (especially for Financial & Banking Sector) February 29, 2020
    Hey there, I'm a high school student here, I am participating in an international challenge based competition to find solution and unique logic based ideas for the topic "Cybersecurity in the age of IoT". I'm having like tons of ideas on my mind and can't figure one from 'em. Plz help me out with this […]
  • Student Progression February 24, 2020
    Hello, I am a new cyber security student and was hoping someone could please answer a question I have regarding my progression as a student. The cyber security field is significantly large and was wondering if it was better to gain a little understanding of everything or a greater understanding in one area? Thank you […]
  • Cato Networks February 21, 2020
    Has anyone heard of Cato Networks? Just curious what your thoughts are on them as a company. submitted by /u/brendatrevino79 [link] [comments]
  • Novel corona virus scare used to spread malware February 12, 2020
    submitted by /u/humanfirewall2020 [link] [comments]
  • ELI5 - stolen bank login details maybe? February 12, 2020
    Sorry if this is the wrong place to post this. I'm trying to do as much of my own research as possible. So, I'm trying to figure out if this is a cyber security issue or something else. I noticed multiple debited amounts from my bank account. I went on to see it was PayPal. […]
  • Question for the SOC/NOC leaders February 9, 2020
    What's the number one pain point you are currently struggling within your operation? submitted by /u/Silver-Passenger [link] [comments]

RSS Cyber Attacks, Cyber Crime and Cyber Security

RSS Krebs on Security

  • Phish of GoDaddy Employee Jeopardized Escrow.com, Among Others April 1, 2020
    A spear-phishing attack this week hooked a customer service employee at GoDaddy.com, the world's largest domain name registrar, KrebsOnSecurity has learned. The incident gave the phisher the ability to view and modify key customer records, access that was used to briefly hijack domains for a half-dozen GoDaddy customers, including transaction brokering site escrow.com.
  • Annual Protest to ‘Fight Krebs’ Raises €150K+ March 30, 2020
    In 2018, KrebsOnSecurity unmasked the creators of Coinhive -- a now-defunct cryptocurrency mining service that was being massively abused by cybercriminals -- as the administrators of a popular German language image-hosting forum. In protest of that story, forum members donated hundreds of thousands of euros to nonprofits that combat cancer (Krebs means "cancer" in German). […]
  • Russians Shut Down Huge Card Fraud Ring March 26, 2020
    Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring. Cybersecurity experts say the raid included the charging of a major carding kingpin thought to be tied to dozens of carding shops and to some of the bigger data breaches targeting western retailers over the […]
  • US Government Sites Give Bad Security Advice March 25, 2020
    Many U.S. government Web sites now carry a message prominently at the top of their home pages meant to help visitors better distinguish between official U.S. government properties and phishing pages. Unfortunately, part of that message is misleading and may help perpetuate a popular misunderstanding about Web site security and trust that phishers have been […]
  • Who’s Behind the ‘Web Listings’ Mail Scam? March 23, 2020
    In December 2018, KrebsOnSecurity looked at how dozens of U.S. political campaigns, cities and towns had paid a shady company called Web Listings Inc. after receiving what looked like a bill for search engine optimization (SEO) services rendered on behalf of their domain names. The story concluded that this dubious service had been scamming people […]
  • Security Breach Disrupts Fintech Firm Finastra March 20, 2020
    Finastra, a company that provides a range of technology solutions to banks worldwide, said it was shutting down key systems in response to a security breach discovered Friday morning. The company's public statement and notice to customers does not mention the cause of the outage, but their response so far is straight out of the […]
  • Zyxel Flaw Powers New Mirai IoT Botnet Strain March 20, 2020
    In February, hardware maker Zyxel fixed a zero-day vulnerability in its routers and VPN firewall products after KrebsOnSecurity told the company the flaw was being abused by attackers to break into devices. This week, security researchers said they spotted that same vulnerability being exploited by a new variant of Mirai, a malware strain that targets […]
  • Coronavirus Widens the Money Mule Pool March 17, 2020
    With many people being laid off or working from home thanks to the Coronavirus pandemic, cybercrooks are almost certain to have more than their usual share of recruitable "money mules" -- people who get roped into money laundering schemes under the pretense of a work-at-home job offer. Here's the story of one upstart mule factory […]
  • The Web’s Bot Containment Unit Needs Your Help March 16, 2020
    Anyone who's seen the 1984 hit movie Ghostbusters likely recalls the pivotal scene where a government bureaucrat orders the shutdown of the ghost containment unit, effectively unleashing a pent-up phantom menace on New York City. Now, something similar is in danger of happening in cyberspace: Shadowserver.org, an all-volunteer nonprofit organization that works to help Internet […]
  • Live Coronavirus Map Used to Spread Malware March 12, 2020
    Cybercriminals constantly latch on to news items that captivate the public's attention, but usually they do so by sensationalizing the topic or spreading misinformation about it. Recently, however, cybercrooks have started disseminating real-time, accurate information about global infection rates tied to the Coronavirus/COVID-19 pandemic in a bid to infect computers with malicious software. 

RSS WeLiveSecurity

  • Marriott hacked again, 5.2 million guests affected April 1, 2020
    Bad actors accessed a range of personally identifiable information, including names, dates of birth and a lot more The post Marriott hacked again, 5.2 million guests affected appeared first on WeLiveSecurity
    Amer Owaida
  • Coronavirus con artists continue to spread infections of their own April 1, 2020
    The scam machine shows no signs of slowing down, as fraudsters dispense bogus health advice, peddle fake testing kits and issue malware-laced purchase orders The post Coronavirus con artists continue to spread infections of their own appeared first on WeLiveSecurity
    Amer Owaida
  • Have you backed up your smartphone lately? March 31, 2020
    With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal information remains safe The post Have you backed up your smartphone lately? appeared first on WeLiveSecurity
    Amer Owaida
  • Work from home: Videoconferencing with security in mind March 30, 2020
    With COVID-19 concerns canceling face-to-face meetings, be aware of the security risks of videoconferencing and how to easily overcome them The post Work from home: Videoconferencing with security in mind appeared first on WeLiveSecurity
    Tony Anscombe
  • Week in security with Tony Anscombe March 27, 2020
    What COVID-19 may mean for privacy rights – Managing supply-chain risks – Two Windows zero-days remain unpatched The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
    Tomáš Foltýn
  • What happens when the global supply chain breaks? March 27, 2020
    If we can’t secure the supply chain, eventually everything else will break The post What happens when the global supply chain breaks? appeared first on WeLiveSecurity
    Aryeh Goretsky
  • 6 tips for safe and secure remote working March 26, 2020
    Getting cybersecurity right in the work-from-home world can feel daunting. ESET Chief Security Evangelist Tony Anscombe shares 6 best practices that will steer you in the right direction. The post 6 tips for safe and secure remote working appeared first on WeLiveSecurity
    Tomáš Foltýn
  • HPE issues fix to stop some SSDs from self‑destructing March 26, 2020
    If left unpatched, a firmware flaw in some enterprise-class solid-state drives could make data on them unrecoverable as early as this fall The post HPE issues fix to stop some SSDs from self‑destructing appeared first on WeLiveSecurity
    Amer Owaida
  • Public health vs. personal privacy: Choose only one? March 25, 2020
    As the world turns to technology to track and contain the COVID-19 pandemic, could this spell the end of digital privacy rights? The post Public health vs. personal privacy: Choose only one? appeared first on WeLiveSecurity
    Tony Anscombe
  • Microsoft warns of two Windows zero‑day flaws March 24, 2020
    Updates for the critical-rated vulnerabilities, which are being actively exploited in the wild, are still weeks away The post Microsoft warns of two Windows zero‑day flaws appeared first on WeLiveSecurity
    Tomáš Foltýn

RSS We Live CyberSecurity Feed

  • Marriott hacked again, 5.2 million guests affected April 1, 2020
    Bad actors accessed a range of personally identifiable information, including names, dates of birth and a lot more The post Marriott hacked again, 5.2 million guests affected appeared first on WeLiveSecurity
  • Coronavirus con artists continue to spread infections of their own April 1, 2020
    The scam machine shows no signs of slowing down, as fraudsters dispense bogus health advice, peddle fake testing kits and issue malware-laced purchase orders The post Coronavirus con artists continue to spread infections of their own appeared first on WeLiveSecurity
  • Have you backed up your smartphone lately? March 31, 2020
    With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal information remains safe The post Have you backed up your smartphone lately? appeared first on WeLiveSecurity
  • Work from home: Videoconferencing with security in mind March 30, 2020
    With COVID-19 concerns canceling face-to-face meetings, be aware of the security risks of videoconferencing and how to easily overcome them The post Work from home: Videoconferencing with security in mind appeared first on WeLiveSecurity
  • Week in security with Tony Anscombe March 27, 2020
    What COVID-19 may mean for privacy rights – Managing supply-chain risks – Two Windows zero-days remain unpatched The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
  • What happens when the global supply chain breaks? March 27, 2020
    If we can’t secure the supply chain, eventually everything else will break The post What happens when the global supply chain breaks? appeared first on WeLiveSecurity
  • 6 tips for safe and secure remote working March 26, 2020
    Getting cybersecurity right in the work-from-home world can feel daunting. ESET Chief Security Evangelist Tony Anscombe shares 6 best practices that will steer you in the right direction. The post 6 tips for safe and secure remote working appeared first on WeLiveSecurity
  • HPE issues fix to stop some SSDs from self‑destructing March 26, 2020
    If left unpatched, a firmware flaw in some enterprise-class solid-state drives could make data on them unrecoverable as early as this fall The post HPE issues fix to stop some SSDs from self‑destructing appeared first on WeLiveSecurity
  • Public health vs. personal privacy: Choose only one? March 25, 2020
    As the world turns to technology to track and contain the COVID-19 pandemic, could this spell the end of digital privacy rights? The post Public health vs. personal privacy: Choose only one? appeared first on WeLiveSecurity
  • Microsoft warns of two Windows zero‑day flaws March 24, 2020
    Updates for the critical-rated vulnerabilities, which are being actively exploited in the wild, are still weeks away The post Microsoft warns of two Windows zero‑day flaws appeared first on WeLiveSecurity