Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Antus67

Pages: [1] 2 3 ... 240
Author:  Sergiu Gatlan

Cybercriminals have upgraded their credit card skimming scripts to use an iframe-based phishing system designed to phish for credit/debit card info from Magento-powered store customers on checkout.

Magecart groups usually inject JavaScript-based payment data skimmers within the code of the website, with the scripts collecting and exfiltrating payment information in the background and customers never even noticing that it happened.

In this case, as Malwarebytes security researcher Jérôme Segura discovered, the crims injected their credit card stealer scripts within every page of the hacked websites and configured it to pop-up as a phishing form asking the buyers to provide the info themselves.

full article here:

Author: Lawrence Abrams

Microsoft has officially started to roll out Windows 10 version 1903, called the May 2019 Update, to everyone. Originally released to Insiders for testing on April 8th, Microsoft has now made it available to everyone.

According to an announcement by Microsoft, their month long testing by Windows Insiders has shown that the Windows 10 May 2019 Update is ready to be made available to all users.

For users who wish to install it now, they can go to Settings -> Update & Security -> Windows Update and then check for new updates. If the update is available in your region, it will not be installed automatically, but rather offered as an available "Feature update to Windows 10, version 1903" that you can choose to "Download and install now".

full article here:

Author: Zeljka Zorz, Managing EditorMay 21, 2019

Microsoft’s May 2019 security fixes have again disrupted the normal functioning of some endpoint security products on certain Windows versions.

We have had a few customers reporting that following on from the Microsoft Windows 14th May patches they are experiencing a hang on boot where the machines appear to get stuck on ‘Configuring 30%’,” UK-based Sophos explained.

“We have currently only identified the issue on a few customers running Windows 7 and Windows Server 2008 R2.”

Sophos is working on fixing the problem. In the meantime, users of Sophos Endpoint Security and Control and Sophos Central Endpoint Standard/Advanced have been advised to remove the “offending” Windows updates (KB4499164 or KB4499165) for the AVs to work, and delay the patching until Sophos delivers the update that will fix the conflict.

full article here:


Author: Tom Spring
May 21, 2019 5:21 pm

Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy.

Mozilla patched several critical vulnerabilities with the release of its Firefox 67 browser on Tuesday.

The worst of the bugs patched are two memory safety flaws that could allow attackers to exploit the vulnerabilities to take control of an affected system, according to a security bulletin issued by United States Computer Emergency Readiness Team (US-CERT).

One of the critical bugs (CVE-2019-9800) impacts the Firefox and the Firefox ESR browser in version 66. The Firefox ESR browser is its Extended Support Release version of Firefox, designed for mass deployments.

full article here:

Author: Ionut Arghire on May 21, 2019

Mozilla this week released Firefox 67 to the stable channel with improved protection against tracking and with fingerprinting and crypto-mining protection capabilities.

The new feature builds on the previously introduced privacy-focused opt-in Tracking Protection on the desktop, Tracking protection by default on iOS, and the Facebook Container Extension, all of which were released last year.

According to Mozilla, its customers have long asked for features and services that respect online privacy, and it has already promised to tackle harmful practices like fingerprinting, which is used to track users across the web, and crypto-mining, which hijacks a computer’s CPU to generate crypto-currency for someone else’s benefit.

In Firefox 67, users can turn on features that allow them to stay protected from these nefarious practices. The options have been previously tested in the pre-release channels last month, the browser maker explains.

full article here:

Author: Dark Reading Staff

An AWS-hosted database was configured with no username or password required for access to personal data.

How many Instagram influencers does it take to create a massive unplanned data release? At least 49 million, if the contents of a publicly exposed database are any indication.

In the latest data incident involving an AWS-hosted database misconfiguration, a database containing contact information for millions of Instagram influencers was found by researcher Anurag Sen, who discovered that the information required no username or password for access.

full article here:

Author: Lawrence Abrams

Microsoft has officially released the Microsoft Edge for Mac preview, which contains optimizations made specifically to make it look and feel like a macOS application.

Last month we reported that the download URLs for the Microsoft Edge browser for Mac were leaked online, which allowed users to try the browser before it was officially released.

Today, Microsoft officially released the Microsoft Edge for Mac on the Microsoft Edge Insider site. The released version is

full article here:

Author: Help Net SecurityMay 20, 2019

Users of Software-as-a-Service (SaaS) and webmail services are being targeted with increasing frequency, according to the APWG Q1 2019 Phishing Activity Trends Report.

The category became the biggest target in Q1, accounting for 36 percent of all phishing attacks, for the first time eclipsing the payment-services category which suffered 27 percent of attacks recorded in the quarter.

Online SaaS applications have become fundamental business tools, since they are convenient to use and cost-effective. SaaS services include sales management, customer relationship management (CRM), human resource, billing and other office applications and collaboration tools

full article here:


Author: Tara Seals
May 20, 2019 10:22 am

An attacker can supply a malicious hyperlink in order to secretly alter the download path for files shared in a Slack channel.

A remotely exploitable vulnerability in the Windows desktop app version of the Slack collaboration platform has been uncovered, which allows attackers to alter where files from Slack are downloaded. Nefarious types could redirect the files to their own SMB server; and, they could manipulate the contents of those documents, altering information or injecting malware.

According to Tenable Research’s David Wells, who discovered the bug and reported it via the HackerOne bug-bounty platform, a download hijack vulnerability in Slack Desktop version 3.3.7 for Windows would allow an attacker to post a specially crafted hyperlink into a Slack channel that changes the document download location path when clicked. Victims can still open the downloaded document through the application, however, that will be done from the attacker’s Server Message Block (SMB) share.

full article here:

Author: Jai Vijayan

Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.

The authors of the Trickbot banking Trojan have once again begun using URL redirection instead of malicious email attachments to spread their malware. It is the latest example of how cybercriminals constantly evolve — and sometimes recycle — their tactics to stay ahead of defenders.

Security researchers from Trend Micro on Monday said they had recently discovered a new variant of Trickbot arriving via redirection URL in a spam mail message. The URL appears to point toward a Google domain but instead redirects users who click on it to a site that downloads Trickbot on the user's system

full article here:

Author: Jon Fingas, @jonfingas

Online account hijackers received a taste of ironic punishment this week. KrebsOnSecurity has learned that hackers stole the database from the popular hijacker forum OGusers on May 12th, obtaining email addresses, hashed passwords, IP addresses and private forum messages for 112,988 accounts. The administrator initially told users that a hard drive failure had wiped out the information and forced the use of a backup, but that tall tale fell apart when the administrator of a rival forum made the data public.

full article here:

Author:  Craig Silverman BuzzFeed News Reporter

More than half a billion people have installed VidMate, an Android app that enables them to download videos from YouTube, WhatsApp, and other platforms. This functionality made VidMate, which has ties to Chinese tech giant Alibaba, hugely popular in countries such as India where streaming mobile video can be expensive or at times unreliable.

But it appears that convenience still comes at a high cost for users. VidMate has been displaying hidden ads, secretly subscribing people to paid services, and draining users’ mobile data, according to findings from security researchers at a London-based mobile technology firm.

full article here:

Author: Ionut Ilascu

In a report on Friday, Google highlights the importance of linking a phone to an account when it comes to fighting hijacking attempts from automated attempts from bots, phishing, and targeted attacks.

An email address is at the center of our online life, essential for creating accounts to web services and for receiving communication more or less sensitive in nature.

Moreover, providers of a large host of services, like Google and Microsoft, have moved to the single sign-in system where the same username and password to access all services from the same provider. On top of this, these accounts can be used to sign up or log into third-party services.

full article here:

Author: Lawrence Abrams

The new Microsoft Edge is deviating from other Chromium based browsers by redesigning the user interface for the Clear browsing data function.  Not only are the Microsoft developers making it easier to find this privacy feature, but they are also improving the interface so all data options are visible by default.

Currently Chromium browsers include a "Clear browsing data" option that by default will clear your browsing history, cookies and site data, and cached images and files. If you want to erase other information such as passwords, site permissions, hosted app data, or form autofill information, you first need to click on the Advanced tab.

full article here:

Author: Help Net Security

Publicly traded companies suffering the worst data breaches averaged a 7.5 percent decrease in stock price, a Bitglass report reveals.

Bitglass researched the three largest data breaches of publicly traded companies from each of the last three years in order to uncover cybersecurity trends and demonstrate the extensive damage that can be done by improper security. Among the incidents detailed in the Kings of the Monster Breaches report are the Marriott breach of 2018, the Equifax breach of 2017 and the Yahoo! breach of 2016.

The report explores the causes, repercussions and company responses for each of these preeminent breaches. Additionally, it recaps three of the most significant cybersecurity incidents that affected government agencies and private companies over the last three years.

full article here:

Pages: [1] 2 3 ... 240