Tag: Security

  • MacRansom: Offered as Ransomware as a Service

    Many Mac OS users might assume that their computer is exempt from things like ransomware attacks and think that their system is somehow essentially “secure.” It is true that it’s less likely for a Mac OS user to be attacked or infected by malware than a Windows user, but this has nothing to do with…

  • This Week in Open Source News: Toyota Picks AGL for 2018 Camry, Raspberry Pi Vulnerability & More

    This week in open source and Linux news, Toyota’s 2018 Camry to feature Automotive Grade Linux (AGL) infotainment system, older Raspberry Pis risk vulnerability without updating, and more. Read on! Read full news article on Linux.com  

  • New social engineering scheme triggers on mouse movement

    One of threat actors’ favorite malware delivery schemes is social engineering as it remains highly effective against a variety of targets. Malicious spam, in particular, is one of the biggest threats enterprises are facing today in the form of daily deliveries of fake invoices, contract, and other receipts. Read full news article on Malwarebytes Unpacked  

  • Is WannaCry Really Ransomware?

    This post summarizes the significant efforts of a McAfee threat research team that has been relentless in its efforts to gain a deeper understanding of the WannaCry ransomware. We would like to specifically acknowledge Christiaan Beek, Lynda Grindstaff, Steve Grobman, Charles McFarland, and Kunal Mehta for their efforts. Read full news article on McAfee Labs…

  • LatentBot piece by piece

    LatentBot is a multi-modular Trojan written in Delphi and known to have been around since 2013. Recently, we captured and dissected a sample distributed by RIG Exploit Kit. Read full news article on Malwarebytes Unpacked  

  • Executive Insights: Innovating for Business Success

    Innovation, at its core, is about creating an environment where creativity is encouraged, resourced, and rewarded. We saw that point illustrated in the news recently. Read full news article on Fortinet Blog  

  • Websites built by freelance developers are plagued with security failures

    Websites developed by “budget” developers, without portfolios or references, tend to be plagued with critical security failures, research has shown. For this project, the Tripwire Vulnerability and Exposure Research Team (VERT) took on a non-technical persona and hired nearly 20 developers to create a website, with bids going up to $250. Read full news article…

  • Multiple Vulnerabilities Found in Popular IP Cameras

    Multiple vulnerabilities have been found in China’s Foscam-made IP cameras. The vulnerabilities were reported to the manufacturer several months ago, but no fixes have been made available. Read full news article on SecurityWeek  

  • Government’s software vulnerability repository is slow to add new cyberthreats, report says

    There is a median lag time of approximately seven days between when someone discovers an exploitable software vulnerability and its eventual release on the National Vulnerability Database, or NVD, according to research conducted by U.S. cybersecurity and dark web intelligence firm Recorded Future. Read full news article on Cyberscoop  

  • NSA Malware “EternalBlue” Successfully Exploit and Port into Microsoft Windows 10

    A Malware called “EternalBlue”  Vulnerability Successfully port the exploit to Microsoft Windows 10 by the Security Researchers which has been only affected earlier with Microsoft Windows XP (Server 2003) and Microsoft Windows 7 (Server 2008 R2) Along with Wanna cry Ransomware. EternalBlue Malware infecting Windows based  Server Message Block (SMB) protocol Developed By National Security…

  • Threat Insights: The Future of Smart and Automated Threats

    Threat report data is only as useful as the analysis and context that goes along with it. We asked Derek Manky, global security strategist with our FortiGuard Labs team, to share his thoughts on what some of the data in our recent Threat Landscape Report means going forward. Read full news article on Fortinet Blog…

  • For timely vulnerability information, unofficial sources are a better bet

    From over 12,500 disclosed Common Vulnerabilities and Exposures (CVEs), more than 75% were publicly reported online before they were published to the NIST’s centralized National Vulnerability Database (NVD), Recorded Future researchers have found. The data, taken from the beginning of 2016, showed that the median lag was seven days between a CVE being revealed to…