Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Antus67

Pages: [1] 2 3 ... 269
Author:  Lawrence Abrams

The Tor Project has raised $86,000 for a Bug Bash Fund that will be used to pay developers to quickly fix critical bugs such as fulor privacy issues that leak personal information about a Tor user.

Last month, the Tor Project announced that any donations made to the organization in August 2019 would be added to a Bug Bash Fund that would be used to pay for developers to fix critical bugs that come up.

full article here:

Author: Mayank Parmar

The latest version of the Microsoft Edge Dev browser now includes an experimental Extensions menu that offers a more organized way to manage the installed extensions in the browser. In order to use this feature, though, you will need to start Edge with special command line arguments, which we will describe in this article.

As Microsoft Edge is based on the Chromium browser, the same open-source platform that powers Google Chrome, Edge has access to a larger set of features including ones developed by Google engineers.

full article here:

Author: Associated Press on September 14, 2019

An Ohio gamer upset about a $1.50 bet while playing Call of Duty: WWII online was sentenced Friday to 15 months in prison for recruiting a prankster to make a bogus emergency call that resulted in the fatal shooting of a Kansas man by police.

Casey Viner, 19, of North College Hill, Ohio, also is restricted from gaming activity for two years while he is on supervised release after serving his prison term, U.S. District Judge Eric Melgren said in announcing the sentence.

full article here:

Security & Technology News / US Sanctions 3 Cyber Attack Groups Tied to DPRK
« on: September 15, 2019, 03:11:19 am »
Author: Dark Reading Staff

Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.
Today, three North Korean state-sponsored malicious cyber groups were sanctioned by the U.S. government for their role in North Korea’s malicious cyber activity on critical infrastructure. Lazarus Group, Bluenoroff, and Andariel were identified as "agencies, instrumentalities, or controlled entities of the Government of North Korea" by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) in documents announcing the sanctions.

full article here:

Auuthor: Ionut Ilascu

The U.S. Treasury signed sanctions against three hacking groups actively engaged in cyber operations meant to bring financial assets to the government of North Korea.

The groups are Lazarus, Bluenoroff, and Andariel, well-known in the security industry for cyber operations aimed at cyberespionage, data theft, monetary reward, and data destruction.

By signing the sanctions, the U.S. Treasury U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) puts a lock on all properties and financial assets owned by the three groups in the U.S. and prohibits all dealings involving these goods.

full article here;

Author:  Zeljka Zorz, Managing Editor
September 13, 2019

Sophos plans to open source Sandboxie, a relatively popular Windows utility that allows users to run applications in a sandbox. Until that happens, they’ve made the utility free.

Sandboxie creates a virtual container in which untrusted programs can be run or installed so that they can’t maliciously modify the underlying OS or data on the host machine.

full article here;

Tara Seals
September 13, 2019  12:06 pm

At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses.

Facebook and YouTube profiles are at the heart of an ongoing phishing campaign spreading the Astaroth trojan, bent on the eventual exfiltration of sensitive information. The attack is sophisticated in that it uses normally trusted sources as cover for malicious activities – thus evading usually effective email and network security layers.

The attack starts with an .HTM file attached to an email, according to Aaron Riley, researcher at Cofense. He noted in an analysis this week that the emails come in three “flavors” – an invoice theme, a show ticket theme and a civil lawsuit theme.

full article here:

Author: Ionut Arghire on September 13, 2019

A publicly accessible, unprotected database belonging to car dealership marketing firm Dealer Leads was found to expose 198 million records, including personally identifiable information, Security Discovery reports.

The database contained 413GB of data representing a compilation of information on potential car buyers, vehicles, loan and finance inquiries, log data with IP addresses of visitors, and more.

With thousands of automotive sites, each specifically aimed at a precise buyer demographic or behavioral characteristic, Dealer Leads delivers content relevant and related to the auto industry or specific target keywords.

full article here:

Author: Kelly Sheridan

New malware bearing similarities to Ryuk ransomware has been discovered in a campaign attempting to steal files containing confidential military, financial, and law enforcement data.

This campaign, which was detected by the MalwareHunterTeam, does not encrypt the target's data and demand a ransom as Ryuk normally does. Instead, it searches victims' computers for sensitive files, steals them, and uploads the information to a site under the operators' control.

full article here:

Author:Sergiu Gatlan

A new malware dropper was observed while infecting computers with a Netwire malicious payload hidden between two benign binaries and using obfuscation to fly under the radar of most anti-malware solutions.

"WiryJMPer is a seemingly ordinary dropper with unusual obfuscation. It uses two benign binaries with superfluous jumps and dead branches sandwiched between the binaries to hide its virtual machine, protecting its Netwire payload," found Avast researchers Adolf Středa and Luigino Camastra.

NetWire (also known as Recam or NetWiredRC) is a remote access trojan (RAT) widely used since 2012 with remote control capabilities and a focus on keylogging and password-stealing that enables attackers to gain unauthorized access and remotely control their victims' computers, among a host of other things.

full article here:

Author: Ionut Ilascu

A weakness named NetCAT (Network Cache ATtack) affects all Intel server-grade processors since 2012 and allows sniffing sensitive details by mounting a side-channel attack over the network.

Researchers from the VUSec group at Vrije Universiteit Amsterdam discovered that information present in the CPU cache on systems with Intel’s Data Direct I/O (DDIO) feature enabled.

full article here:

Elizabeth Montalbano
September 12, 2019  8:37 am

The organization accidentally sent the names, email addresses, gender and professional information of users of its portal Agora in an email sent in August.

The charity organization UNICEF inadvertently leaked the personal details of thousands of people who use its online learning portal Agora by way of an errant email sent to 20,000 inboxes.

The email was accidentally sent on August 26 by UNICEF and included the names, email addresses, gender and professional information of 8,253 users of Agora, according to a published report. The Agora program offers learning solutions to UNICEF’s staff, partners and supporters.

Nearly 20,000 Agora users received the leaked data tied to users enrolled in courses on immunization.

full article here:

Author: Eduard Kovacs on September 12, 2019

Researchers at AdaptiveMobile Security, a firm that specializes in cyber telecoms security, have disclosed a new SIM card attack method that could work against over 1 billion mobile phones, and they claim it has already been exploited by a surveillance company to track users.

Dubbed Simjacker, the attack involves sending a specially crafted SMS message to the targeted phone. The message contains SIM Toolkit (STK) instructions and it’s processed by the SIM card (the universal integrated circuit card, or UICC), specifically the S@T Browser present on the SIM.

full article here:

Author: Kelly Sheridan

A now-patched Instagram vulnerability could have exposed users' account data and phone numbers to cyberattackers, parent company Facebook confirmed in a new report from Forbes.

The bug was discovered by an Israeli hacker who goes by the handle @ZHacker13. It could have potentially been used to access user data including names, full phone numbers, and Instagram account numbers and handles – all an attacker needs to narrow their focus on a specific person.

full article here:

Author: Ionut Ilascu

Virtual disk files are locked containers that shield the items inside from online or local security defenses. The trick can help adversaries deliver malware invisibly to a target's computer.

Vulnerability analyst Will Dormann last week published research on VHD and VHDX files being treated like a black box by Windows and the operating system.

The details stirred the interest of security researchers who used real malware encapsulated in a VHD file to test the detection rate of multiple antivirus engines. Products that normally detected the malware samples became blind to them.

full article here:

Pages: [1] 2 3 ... 269