Page 36 of 44 FirstFirst ... 262829303132333435363738394041424344 LastLast
Results 876 to 900 of 1081
  1. #876
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Unbeknownst to many, last month Microsoft patched one of the most severe bugs ever reported to the company, an issue that could be abused to easily take over Windows Servers running as domain controllers in enterprise networks.


    The bug was patched in the August 2020 Patch Tuesday under the identifier of CVE-2020-1472. It was described as an elevation of privilege in Netlogon, the protocol that authenticates users against domain controllers.

    The vulnerability received the maximum severity rating of 10, but details were never made public, meaning users and IT administrators never knew how dangerous the issue really was.


    Zerologon attack lets hackers take over enterprise networks: Patch now | ZDNet

  2. #877
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    For all those digital hypochondriacs out there, here's more news about Microsoft security vulnerabilities and patches within the last couple weeks. Not much comfort out there.

    Microsoft Patch Tuesday, Sept. 2020 Edition — Krebs on Security

  3. #878
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    If you are dumb enough to be using Anvisoft as your antivirus, ditch it immediately.

    Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack — Krebs on Security

  4. #879
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    If you use Firefox for Android, update it pronto.

    Mozilla has patched a security flaw that could allow cybercriminals to hijack all vulnerable Firefox for Android browsers running on devices connected to the same Wi-Fi network. The vulnerability could be abused to force users to visit websites housing malicious content, which could then be used to execute phishing attacks or to download malware to their devices.

    The vulnerability was discovered by Australian security researcher Chris Moberly, who said, “The victim simply has to have the Firefox application running on their phone. They do not need to access any malicious websites or click any malicious links. No attacker-in-the-middle or malicious app installation is required.” Moberly worked with Mozilla to fix the vulnerability with the updated Firefox version.

    Firefox for Android vulnerability allows hackers to hijack device over Wi-Fi | 2020-09-22 | Security Magazine

  5. #880
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Suspected ransomware attack hits one of the largest hospital networks in the US

    One of the US’s largest healthcare providers has been hit by what looks like a highly coordinated ransomware attack (via NBC News). Over the weekend, hospitals in the US operated by Universal Health Services started to notice problems with their IT systems, with some employees reporting that they could not access their computers.

    In a statement the company shared on Monday morning, UHS said its computer network is down due to an "IT security issue." The company says it doesn't appear like employee or patient data was accessed in the incident. UHS cares for approximately 3.5 million patients each year and operates about 400 healthcare facilities across the US and UK.

    "We implement extensive IT security protocols and are working diligently with our IT security partners to restore IT operations as quickly as possible," the statement reads. "Patient care continues to be delivered safely and effectively."

    NBC News reports some UHS hospitals have had to fall back on filing patient information using pen and paper due to the attack. On Reddit and Twitter, there are also reports of UHS facilities redirecting ambulances to other nearby hospitals. "When the attack happened multiple antivirus programs were disabled by the attack and hard drives just lit up with activity," says one of those reports.

    A UHS employee told Bleeping Computer that they saw files renamed during the attack to include a .ryk extension. That extension is associated with the Ryuk ransomware. Like most other ransomware, Ryuk encrypts files to prevent someone from accessing them until they pay a fee.

    Suspected ransomware attack hits one of the largest hospital networks in the US | Engadget

  6. #881
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    Didn't expect to see this happening in Russia.

    Big Game Hunting: Now in Russia
    (It's not about animals)
    "The email raised no suspicions. An employee of a Russian medical company boldly clicked on the link and downloaded the attached ZIP archive. The message with the subject "Bill due" looked like it had been sent by the Finance Department of a large Russian media holding, the RBC Group. After the executable file was run for just twenty seconds, Windows Defender detected and deleted the malware. Yet these twenty seconds were enough for the Trojan to achieve persistence in the infected system. The victim failed to notice anything. Three weeks later, the company's employees arrived at work and were greeted by an alarming message on their computer screens: "Your files have been encrypted". All work stopped. The attackers demanded $50,000 in cryptocurrency to decrypt the files. A new cybercriminal group called OldGremlin was behind that attack."
    Big Game Hunting: Now in Russia

  7. #882
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Filthy Russian thief jailed for seven years. Russia, of course, tried to protect him. Suck on that Vladdy boy.

    A Russian scumbag found guilty of hacking into LinkedIn, Dropbox, and Formspring – and stealing data on over 200 million users – has been sent down for more than seven years. Yevgeniy Nikulin was sentenced to 88 months in an American prison by a federal court in San Francisco this week though the judge in this case, William Alsup, was surprisingly kind about the 32-year-old Russian. “I think you’re a brilliant guy. Very smart,” Alsup told him. “I urge you to apply that brilliance to a lawful profession and do something good with your life other than hacking into computers.”

    The sentence will account for the four years Nikulin has already spent behind bars following his capture in a restaurant while on holiday in Prague in 2016 after he attracted attention by driving around in a flashy car and spending liberally. He was charged with nine criminal counts of computer intrusion, causing damage to a protected computer, aggravated identity theft, trafficking, and conspiracy.

    His trial in the US was dogged by delays: first by Russian authorities who tried to prevent him being extradited to America, then following a lengthy dispute over whether he was mentally fit to stand trial. When the hearings finally began, it was almost immediately put on hold due to the coronavirus outbreak, and was nearly abandoned after jury members objected to being in close confines for weeks.
    Russian hacker, described as 'brilliant' by judge, gets seven years in a US clink for raiding LinkedIn, Dropbox • The Register

  8. #883
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    I imagine that for Vladdy, this is another boost for Russian national pride, despite the arrest. Isn't hacking what Russia is most famous for right about now? The country is struggling in a lot of areas, but not in its reputation for cyber warfare expertise.

  9. #884
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    You might be able to buy your own homemade porn for $150....

    A hacker collective claims to have breached over 50,000 home security cameras before going on to steal people’s private footage and post some of it online. While a considerable portion of the videos seems to have come from Singapore, a number of people living in Thailand, South Korea, and Canada also seem to have their privacy invaded.

    Some of the videos – which range from one to twenty minutes in length and show people of varying ages in compromising positions or various stages of undress – have been uploaded to porn websites.

    The New Paper
    , which broke the story, quoted the unnamed hacker group as saying that it has shared the clips with over 70 members who paid US$150 for lifetime access to the loot. The gang, whose group on the instant messaging app Discord has nearly 1,000 members, reportedly specializes in hacking security cameras.


    To lend extra credence to their claims, the collective is offering a free sample containing 700 megabytes worth of data comprising over 4,000 clips and pictures. They’re also reportedly willing to share access to all hijacked cameras with fellow members. Moreover, “VIP members” with voyeuristic tendencies will be treated to a course on how to “explore, watch live and record” hacked cameras, which could mean that the number of private videos could grow over time.
    50,000 home cameras reportedly hacked, footage posted online | WeLiveSecurity

  10. #885
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    Ok, I think I can do without security cameras at home. I'll just buy better locks because they, at least, can't spy on me.

  11. #886
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Watch out for dodgy offers of free McAfee Internet Security.

    It's the chinkies trying to Phish you.

    *** The Security News Thread  ***-07vpzcnqrhcqafbdjaix0vw-2-png

    Google: Chinese Hackers Are Posing as McAfee Antivirus to Phish Victims

  12. #887
    Thailand Expat misskit's Avatar
    Join Date
    Dec 2009
    Last Online
    @
    Location
    Chiang Mai
    Posts
    48,094
    ^ That one popped up on my iPad last week.

  13. #888
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    Amazed that there are no spelling errors or other common signs of fishing. They look like pros.

  14. #889
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Quote Originally Posted by TTraveler View Post
    Amazed that there are no spelling errors or other common signs of fishing. They look like pros.
    Chinky government hackers. Probably learned their trade at MIT.

  15. #890
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    If you are using Chrome or a Chromium based browser, do an update ASAP.

    And check Firefox also.

    Google Patches Actively-Exploited Zero-Day Bug in Chrome Browser
    Google Patches Actively-Exploited Zero-Day Bug in Chrome Browser | Threatpost

  16. #891
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    If you're using a Tenda Router you should apply the latest firmware. This will still leave you open to DoS attacks, but at least no-one can steal your data.

    ( I don't have one myself, you'll have to hunt through the menus for the Firmware Update option).

    Tenda Router Zero-Days Emerge in Spyware Botnet Campaign | Threatpost

  17. #892
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Ooops

    A data breach at the security company Gunnebo has led to large amounts of sensitive information about security systems around the world being published openly online.

    This is what Dagens Nyheter reveals today.

    These will be 38,000 files, including drawings of bank vaults, monitoring and alarm equipment and
    security functions for ATMs.

    The intrusion must have taken place in August and include information for customers worldwide.
    Enormous security leak at the Rikssbanken and banks – Nord News

  18. #893
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    Gunnebo is now one of those companies that security pros no longer want on their resumes.

  19. #894
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Well fair play to them, they aren't paying the ransom.

    A comment on information in the media about the IT-incident

    This Tuesday, Swedish media once again reported on the data breach to which Gunnebo was subjected, and which the company communicated via a press release on 25 August. As Gunnebo already stated at the time, the incident is extremely regrettable.

    In the media reporting on Tuesday it is indicated that the company was not aware that data had been copied in the intrusion. However, this information is incorrect. Ever since the data breach was discovered, Gunnebo has worked based on the hypothesis that files may have ended up in the wrong hands, and thus the company decided a few days into the breach to analyze the data on servers around the world. The company has systematically communicated this with affected customers locally. During a later phase, the criminals decided to upload a certain part of Gunnebo's stolen data on the so-called Darknet, also this data set has been further analyzed, which is an ongoing process.

    "Of course, we have been aware that files that originate from us are available on Darknet, and we naturally regret that this is the case. Unfortunately, this is exactly how computer criminals work. Therefore, I would like to emphasize that it has never been an alternative for Gunnebo to pay a ransom to have the files deleted. The only way to curb this kind of crime is that the affected organizations do not fall short and pay out ransoms”, said Stefan Syrén, President and CEO, Gunnebo.

    https://www.gunnebo.com/

  20. #895
    Member

    Join Date
    Jan 2020
    Last Online
    01-08-2023 @ 11:33 PM
    Posts
    510
    If hackers steal from the rich and donate to the poor, is it justified?

    This professional ransomware for hire team just donated $20k in bitcoin to a couple of charities.

    When Hackers Have PR Departments: Tens of Thousands in Stolen Bitcoins Donated To Charity Organizations - CPO Magazine

  21. #896
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Quote Originally Posted by TTraveler View Post
    If hackers steal from the rich and donate to the poor, is it justified?
    Don't be silly.

  22. #897
    or TizYou?
    TizMe's Avatar
    Join Date
    Mar 2007
    Last Online
    27-03-2024 @ 09:51 PM
    Location
    Bonifacio Global City, Taguig
    Posts
    6,451
    *** The Security News Thread  ***-screen-shot-2020-11-14-12-a

    Just noticed this. Is everyone aware?

  23. #898
    or TizYou?
    TizMe's Avatar
    Join Date
    Mar 2007
    Last Online
    27-03-2024 @ 09:51 PM
    Location
    Bonifacio Global City, Taguig
    Posts
    6,451
    *** The Security News Thread  ***-screen-shot-2020-11-14-12-a


    Just noticed this. Is everyone aware?

  24. #899
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    Doesn't surprise me, they rarely bother patching the software that hosts Teakdoor.

  25. #900
    Thailand Expat harrybarracuda's Avatar
    Join Date
    Sep 2009
    Last Online
    @
    Posts
    96,555
    There have been three batches of nasty 0-days released in the last few weeks, so update Chrome and Edge Chromium (and Firefox for the sake of it).

Page 36 of 44 FirstFirst ... 262829303132333435363738394041424344 LastLast

Thread Information

Users Browsing this Thread

There are currently 3 users browsing this thread. (0 members and 3 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •