Month: February 2019

0 Comments
Cryptocurrency mining tool Coinhive has decided to shut up shop, although not because of its rampant abuse by hackers over the past two years. The team behind the Monero miner revealed all in a brief post on Tuesday, claiming that the 18-month project had come to an end as it was no longer economically viable.
0 Comments
by John E Dunn Researchers have revealed how malicious Thunderbolt and PCI Express (PCIe) peripherals could be used to compromise computers running macOS, Windows, Linux and FreeBSD. Nicknamed ‘Thunderclap’ in a presentation at last week’s Network and Distributed System Security Symposium (NDSS), the vulnerability has to do with Direct Memory Access (DMA), a standard technique
0 Comments
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads Days after the team behind Drupal urged website admins to apply an update patching a highly critical vulnerability in the content management system (CMS) platform, threat actors were spotted exploiting the loophole in the wild. The remote code execution
0 Comments
Threat actors can use firmware attacks on bare-metal cloud servers to easily gain persistent access to the hardware, according to new research from hardware security startup Eclypsium. The research showed how vulnerabilities in baseboard management controllers (BMCs) and weaknesses in the reclamation process of bare-metal cloud servers can allow attackers to add other malicious implants
0 Comments
Attackers have been exploring new forms of phishing bait that will entice users to click and have reportedly had success exploiting Bangladesh’s Cairo embassy website, according to researchers at Trustwave. Research conducted at the end of October 2018 revealed that the Coinlmp web miner created a block for a government facility domain. Only two months later, the
0 Comments
Earlier this week, Microsoft used its MWC press conference to announce the next version of its HoloLens mixed reality visor. When it demoed the first version back in 2015, quite a few pundits assumed that the company had somehow faked the demos because this kind of real-time tracking and gesture recognition, combined with a relatively
0 Comments
by Paul Ducklin The Naked Security podcast investigates a massive medical data blunder, tells you how NOT to do vulnerability disclosure, and finds out whether password managers do more harm than good. With Anna Brading, Paul Ducklin, Mark Stockley and Matt Boddy. This week’s stories: Millions of “private” medical helpline calls exposed on internet Virus
0 Comments
Summary Secureworks® Counter Threat Unit™ (CTU) researchers have tracked the activities of the BRONZE UNION threat group (also known as Emissary Panda, APT 27, and LuckyMouse) since 2013. CTU™ analysis suggests that BRONZE UNION is located in the People’s Republic of China. The threat group has historically leveraged a variety of publicly available and self-developed
0 Comments
The BRONZE UNION threat group focuses on espionage and targets a broad range of organizations and groups using a variety of tools and methods. Wednesday, February 27, 2019 By: Counter Threat Unit Research Team This blog and the accompanying threat analysis, entitled A Peek Into BRONZE UNION’S Toolbox, are based on nearly two years of
0 Comments
Cybercriminals have actively started exploiting an already patched security vulnerability in the wild to install cryptocurrency miners on vulnerable Drupal websites that have not yet applied patches and are still vulnerable. Last week, developers of the popular open-source content management system Drupal patched a critical remote code execution (RCE) vulnerability (CVE-2019-6340) in Drupal Core that
0 Comments
Horizon Robotics, a three-year-old Chinese startup backed by Intel Capital, just raised a mega-round of fundings from domestic and overseas backers as it competes for global supremacy in developing AI solutions and chips aimed at autonomous vehicles, smart retail stores, surveillance equipment and other devices for everyday scenarios. The Beijing-based company announced Wednesday in a
0 Comments
Social media platforms are a major conduit for malware and a highly effective marketplace for black hat resources, generating cybercrime worth over $3.2bn every year, according to Bromium. The security vendor’s latest report, Social Media Platforms and the Cybercrime Economy, is the result of a six-month study by Mike McGuire, senior lecturer in criminology at the
0 Comments
Sapling, a three-year-old, San Francisco-based company whose employee management and onboarding software is being adopted by a small but growing number of mid-size companies with far-flung workforces, is announcing today that it has raised $4 million in funding from Gradient Ventures, which is Google’s AI fund, and Tuesday Capital, formerly known as CrunchFund. It quietly
0 Comments
Criminals who launched phishing campaigns during the final quarter of 2018 employed social engineering tactics in nearly one in three targeted attacks, according to Positive Technologies. A new report entitled Cybersecurity Threatscape Q4 2018 found that in 48% of cyber-attacks the hacker’s goal was to steal data. Specifically, attackers were targeting usernames and passwords in 28% of
0 Comments
Anthem is the first attempt by Bioware (of Mass Effect and Dragon Age fame) to tap into the well of cash supposedly to be found in the “game as platform” trend that has grown over the last few years, with Destiny, Warframe and Fortnite as preeminent exemplars. After a botched demo weekend dampened fan expectations,
0 Comments
Developers of Drupal—a popular open-source content management system software that powers millions of websites—have released the latest version of their software to patch a critical vulnerability that could allow remote attackers to hack your site. The update came two days after the Drupal security team released an advance security notification of the upcoming patches, giving