Security researchers linked Jaff ransomware campaigns to the backend infrastructure used by operators behind a black market. Security researchers at Heimdal Security who are investigating a new strain of Jaff ransomware discovered that the malware is sharing the backend infrastructure with a black market offering for sale stolen card data and account information. The black […]
Security Experts are observing a significant increase in the number of malware and hacking tools leveraging the ETERNALBLUE NSA exploit. ETERNALBLUE is the alleged NSA exploit that made the headlines with DOUBLEPULSAR in the WannaCry attack. ETERNALBLUEÂ targets the SMBv1 protocol and it has become widely adopted in the community of malware developers. Investigations on WannaCry […]
According to Shodan search, unprotected Hadoop Distributed File System installations expose 5 PB of data. Hadoop servers that are not securely configured expose vast amounts of data, according to an analysis conducted using the Internet search engine Shodan. A study conducted by Shodan revealed that nearly 4,500 servers with the Hadoop Distributed File System (HDFS) […]
Crowdfunding initiative aims to buy Shadow Brokers leak before threat actors will start using the hacking tools and exploits in the wild. The Shadow Brokers hacker group is going to launch a monthly subscription model for its data dumps, 0-Day Exploit Subscriptions goes for (100 Zcash), approximately $24,450 per month. The hacking tools and exploits that will […]
Russian President Putin says patriotic hackers may have powered attacks against foreign countries and denied Russia involvement. President Vladimir Putin says patriotic hackers may have launched cyber attacks against foreign countries and but denied Russia involvement in cyber espionage campaigns. Russian state-sponsored APT groups area accused of continuous interferences with 2016 US Presidential Election elections […]
OneLogin company announced on Thursday that it had “detected unauthorised access” in its systems located in the United States. OneLogin is a leading identity and access management software vendor providing an identity-driven enterprise security solution. OneLogin is a popular password manager used by many Internet users to allow management of complex passwords as requested by […]
Security researchers at Qualys Security have discovered a Linux Flaw that could be exploited to escalate privileges and overwrite any file on the filesystem. Security researchers at Qualys Security have discovered a Linux flaw that could be exploited to gain root privileges and overwrite any file on the filesystem on SELinux-enabled systems. The high severity flaw, tracked […]
A developer has discovered a flaw in the Chrome browser that could be exploited to secretly Record Audio/Video without indication. The AOL developer Ran Bar-Zik discovered a disconcerting vulnerability in Google’s Chrome browser could be exploited by attackers to record audio or video without giving any visual notification or alert. “After getting the audio\video usage […]
Moscow-based threat intelligence firm Group-IB published a report that details evidence linking the Lazarus APT Group to North Korea. Researchers at security firm Group-IB released a report that links the notorious Lazarus APTÂ to North Korea. The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks […]
According to a report published by Juniper Research, the economic impact of cybercrime is expected to reach $8 trillion price tag over the next five years. According to a report published by Juniper Research, the number of data records that will be compromised in security breaches in 2017 will reach 2.8 billion. The economic impact of […]