Master Decryption Key Released for FilesLocker Ransomware

On December 29th, a Pastbin post was created that contains the master RSA decryption key for the FilesLocker Ransomware. The release of this key has allowed a decryptor to be created that can recover victim's files for free. | Continue reading


@bleepingcomputer.com | 5 years ago

Microsoft Releases Out-Of-Band Security Update for Internet Explorer RCE 0-Day

Microsoft has released an out-of-band security update that fixes an actively exploited vulnerability in Internet Explorer.  This vulnerability has been assigned ID CVE-2018-8653 and was discovered by Google's Threat Analysis Group when they saw the vulnerability being used in tar … | Continue reading


@bleepingcomputer.com | 5 years ago

U.S. Ballistic Missile Defense Systems Fail Cybersecurity Audit

A U.S. Department of Defense Inspector General report released this week outlines the inadequate cybersecurity practices being used to protect the United States' ballistic missile defense systems (BMDS ). | Continue reading


@bleepingcomputer.com | 5 years ago

Save the Children Charity Org Scammed for Almost $1M

If certain crooks have some sort of moral compass that keeps them away from certain victims, others ditch such boundaries for the right amount of money. A perpetrator from the latter category was able to fool the charitable organization Save the Children into misdirecting close t … | Continue reading


@bleepingcomputer.com | 5 years ago

First GDPR Sanction in Germany Fines Flirty Chat Platform EUR 20,000

Following a hack that resulted in leaking online about 808,000 email addresses and over 1.8 million usernames and passwords, a social network website in Germany received a fine of EUR 20,000 from the Baden-Württemberg Data Protection Office. | Continue reading


@bleepingcomputer.com | 5 years ago

Unprotected Mongodb Exposes Scraped Profile Data of 66M

Information belonging to more than 66 million individuals was discovered in an unprotected database, within anyone's reach, if they knew where to look on the web. The records look like scraped data from LinkedIn profiles. | Continue reading


@bleepingcomputer.com | 5 years ago

Microsoft Is Rebuilding Edge Browser Using Chromium for Windows and MacOS

Microsoft has officially confirmed that they are going to be gutting Edge and converting it into a Chromium based browser. While the engine will change, Microsoft has stated that they will continue utilizing the Microsoft Edge name and will now bring the browser to all supported … | Continue reading


@bleepingcomputer.com | 5 years ago

UK's NCSC Explains How They Handle Discovered Vulnerabilities

When the United Kingdom's National Cyber Security Center (NCSC) performs operational tasks, they may find technology vulnerabilities. When they find these vulnerabilities, they go through a decision making process called the "Equities Process" that determines what they will do wi … | Continue reading


@bleepingcomputer.com | 5 years ago

Making a Ransomware Payment? It May Now Violate U.S. Sanctions

Thinking about making a ransomware payment? If so, you may want to think twice before doing so as it could land you in trouble for violating U.S. government sanctions. | Continue reading


@bleepingcomputer.com | 5 years ago

Scam iOS Fitness Apps Steal Money Through Apple Touch ID

iOS fitness apps were discovered that ask you to provide a fingerprint to continue or access your data, but instead pop up a subscription screen that automatically charges a saved credit card for over $100 USD. | Continue reading


@bleepingcomputer.com | 5 years ago

Windows 10 October 2018 Update Build 17763.167 Released to Insiders with Fixes

Today, Microsoft shared more details about Build 17763.167 for Windows 10 version 1809, revealing that they have fixed tons of bugs in this release. It's likely that the same fixes will be released to the general public next month on Patch Tuesday or before. | Continue reading


@bleepingcomputer.com | 5 years ago

Sennheiser Headset Software Could Allow Man-In-the-Middle SSL Attacks

When users have been installing Sennheiser's HeadSetup software, little did they know that they were also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's p … | Continue reading


@bleepingcomputer.com | 5 years ago

Chrome and Firefox Developers Aim to Remove Support for FTP

Google developers have wanted to remove FTP support from Chrome for years and an upcoming change in how files stored on FTP servers are rendered in the browser may be the first step in its ultimate removal.  | Continue reading


@bleepingcomputer.com | 5 years ago

ECC Memory Vulnerable to Rowhammer Attack

Memory modules with error-correcting code (ECC) protection are vulnerable to Rowhammer, an attack that can help corrupt data the computer stores in its volatile memory chips. | Continue reading


@bleepingcomputer.com | 5 years ago

German EID Authentication Flaw Lets You Change Identity

The authentication process via German ID cards with RFID chips to certain web services can be manipulated to allow identity spoofing and changing the date of birth. | Continue reading


@bleepingcomputer.com | 5 years ago

DropBox Security Test Revealed 3 Apple 0-days

When Dropbox hired a security firm to perform a Red Team cyber attack simulation on their services, little did they know that they would discover zero day vulnerabilities in Apple products that could affect much more than Dropbox. | Continue reading


@bleepingcomputer.com | 5 years ago

New Gmail Bug Allows Sending Messages Anonymously

A new bug discovered in Gmail affects the web app's user experience by hiding the source address of an email, a situation that comes with an obvious potential for abuse. | Continue reading


@bleepingcomputer.com | 5 years ago

Hacker Say They Compromised ProtonMail. ProtonMail Says There's No Evidence

A person or group claiming to have hacked ProtonMail and stolen "significant" amounts of data has posted a lengthy ransom demand with some wild claims to an anonymous Pastebin. ProtonMail states it's complete BS. | Continue reading


@bleepingcomputer.com | 6 years ago

Firefox Monitor Now Shows Warnings on Sites with Data Breaches

Mozilla's has added a new feature to their desktop Quantum Browser that displays a warning from Firefox Monitor when visiting a site that previously had a data breach. These warnings are designed to alert people about possible concerns and to suggest they check their email to see … | Continue reading


@bleepingcomputer.com | 6 years ago

iPhone X, Galaxy S9, Xiaomi Mi6 Fall at Pwn2Own Tokyo

iPhone X, Samsung Galaxy S9, and Xiaomi Mi6 all fell at the hands of hackers that found bugs in various components and crafted exploits that allowed complete take over of the targeted device. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Patches Windows Zero-Day Exploited in Cyber Attacks

A zero-day vulnerability in certain editions of Windows operating system helped at least one advanced threat group increase their privileges on compromised machines until Microsoft patched it with this month's release of security updates. | Continue reading


@bleepingcomputer.com | 6 years ago

Some D-Link's routers have bugs that help an attacker get full control over them

Several router models from D-Link are vulnerable to three security bugs that could help an attacker get full control over them. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft November 2018 Patch Tuesday Fixes 12 Critical Vulnerabilities

Today is Microsoft's November 2018 Patch Tuesday, which means we get a ton of security updates to install for Windows and other Microsoft products. As these updates are commonly exploited by attackers, malware, and exploit kits, it is strongly advised that all users install these … | Continue reading


@bleepingcomputer.com | 6 years ago

Google Services Unreachable After Traffic Hijacking

Services from Google on Monday became unavailable for up to two hours as user traffic followed a tortuous path through operators in Russia and Nigeria before hitting the Great Firewall of China. | Continue reading


@bleepingcomputer.com | 6 years ago

An iOS Linux Shell for Your iPhone or iPad

Have you ever wanted to run a Linux shell on your iOS device to transfer files, write shell scripts, or simply to use Vi to develop code or edit files?  Now you can, with a project called iSH that is currently available as a TestFlight beta for iOS devices. | Continue reading


@bleepingcomputer.com | 6 years ago

Cloudflare Brings Its 1.1.1.1 DNS Service to Android & iOS Mobile Devices

This past April, Cloudflare and APNIC released a new 1.1.1.1 public DNS resolver service whose goal was not only to make looking up Internet addresses faster, but also make them more private. Today, Cloudflare has released a 1.1.1.1 app for Android and iOS to easily bring these s … | Continue reading


@bleepingcomputer.com | 6 years ago

Linux CryptoMiners Are Now Using Rootkits to Stay Hidden

To make it harder to spot a cryptominer process that is utilizing all of the CPU, a new variant has been discovered for Linux that attempts to hide its presence by utilizing a rootkit. | Continue reading


@bleepingcomputer.com | 6 years ago

DJI Drone Flight Logs, Photos and Videos Exposed to Unauthorized Access

Popular drone maker DJI exposed user accounts to unauthorized access along with information that passes through the vendor's digital infrastructure; this includes flight logs, videos and images captured by the devices, live camera and microphone feed, and map. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Bug Is Deactivating Windows 10 Pro Licenses and Downgrading to Home

A bug in what appears to be the Microsoft Windows activation service is causing Windows 10 Pro licenses to be downgraded to Windows 10 Home and then stating that Windows is not activated. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 19H1 Build 18277 Is Now Available with Action Center Improvements

Windows 10 19H1 preview build 18277 is now rolling out to the Insiders in the Fast and Skip Ahead Ring with some notable improvements. This test build improves Focus Assist feature, Action Center, introduces new Emojis and more. | Continue reading


@bleepingcomputer.com | 6 years ago

November Android Security Update Fixes Critical Bugs, Drops Media Library

Google released to all users and partners its November security bulletin for the Android operating system, with fixes for critical remote code execution (RCE) and privilege escalation vulnerabilities. | Continue reading


@bleepingcomputer.com | 6 years ago

VirtualBox Zero-Day Vulnerability Details and Exploit Are Publicly Available

A Russian vulnerability researcher and exploit developer has published detailed information about a zero-day vulnerability in VirtualBox. His explanations include step-by-step instructions for exploiting the bug. | Continue reading


@bleepingcomputer.com | 6 years ago

Apache Struts Team Urges Users for Library Update to Plug Years-Old Bugs

In an advisory yesterday, the Apache Software Foundation reiterates its recommendation for users of Struts to make sure their installations run a version of the Commons FileUpload library newer than 1.3.2, lest they expose their projects to possible remote code execution attacks. | Continue reading


@bleepingcomputer.com | 6 years ago

Yes Aol Mail Is Down for the Past Two Hours

Reports have been coming in the for the past 2 hours that AOL Mail is down. It is not currently known what is causing the outage, but the AOL Customer Support Twitter account has stated tht the company is looking into issues with both AOL and Yahoo. | Continue reading


@bleepingcomputer.com | 6 years ago

Security Bug Puts Online Radio Stations at Risk

A vulnerability discovered in Icecast streaming media server could be leveraged by an attacker to kill the broadcast of online radio stations that rely on it to reach their audience. | Continue reading


@bleepingcomputer.com | 6 years ago

Attackers Use Zero-Day That Can Restart Cisco Security Appliances

Unknown attackers have exploited a vulnerability in software running on security hardware products from Cisco that could trigger a restart of the affected devices, the equivalent of a denial-of-service (DoS) condition. | Continue reading


@bleepingcomputer.com | 6 years ago

New BLEEDINGBIT Vulnerabilities Affect Widely-Used Bluetooth Chips

Two vulnerabilities in the Bluetooth chips typically found in access points used to provide WiFi service in enterprises allow attackers to take control of the devices without authentication or breach the network. | Continue reading


@bleepingcomputer.com | 6 years ago

New Stuxnet Variant Allegedly Struck Iran

A malware similar in nature to Stuxnet but more aggressive and sophisticated allegedly hit the infrastructure and strategic networks in Iran. | Continue reading


@bleepingcomputer.com | 6 years ago

Windows 10 Build 18272 Released to Insiders with Improvements

Windows 10 19H1 preview build 18272 is rolling out to the Windows Insiders in the Fast and Skip Ahead rings. Windows 10 Build 18272 comes with several improvements and fixes but there are no major changes. | Continue reading


@bleepingcomputer.com | 6 years ago

Emotet Trojan Begins Stealing Victim's Email Using New Module

The Emotet malware is typically used as a banking trojan and more recently for distributing other malware, but has now become more versatile via a module that allows it to steal a victim's actual emails going back six months. | Continue reading


@bleepingcomputer.com | 6 years ago

Apple Fixes Creepy FaceTime Vulnerability, Crash Bug in MacOS, and More

Today Apple released updates for core products that include iOS 12.1, Safari 12.0.1, iCloud for Windows, iTunes, watchOS 5.1, tvOS 12.1, and macOS. | Continue reading


@bleepingcomputer.com | 6 years ago

Millions of Voter Records Up for Sale Ahead of the US Midterm Elections

As the US midterm elections close in, the underground markets appear to be flush with voter databases available for affordable prices. | Continue reading


@bleepingcomputer.com | 6 years ago

Malware Distributors Adopt DKIM to Bypass Mail Filters

A US-CERT alert provided recommendations on how businesses can mitigate their exposure to the Emotet Trojan. Unfortunately, it looks like criminals also reading the US-CERT's warnings as they have adopted new techniques to bypass these recommendations. | Continue reading


@bleepingcomputer.com | 6 years ago

Majority of Top 30 Sites Don't Offer Wide Range of 2FA Options

The Dashlane password management company has released research showing that the majority of the top 30 consumer sites do not offer a complete range of two factor authentication (2FA) options for login authentication. Of the top 30 sites, only 8 offered all of the tested for 2FA o … | Continue reading


@bleepingcomputer.com | 6 years ago

Mac CryptoCurrency Price Tracker Caught Installing Backdoors

A Trojan pretending to be a macOS cryptocurrency ticker called CoinTicker is installing two backdoors on the macs of unsuspecting users. | Continue reading


@bleepingcomputer.com | 6 years ago

Microsoft Sandboxes Windows Defender

As the infosec community talked about potential cyber attacks leveraging vulnerabilities in antivirus products, Microsoft took notes and started to work on a solution. The company announced that its Windows Defender can run in a sandbox. | Continue reading


@bleepingcomputer.com | 6 years ago

Exposed Docker APIs Continue to Be Used for Cryptojacking

Trend Micro has recently spotted an attacker that is scanning for exposed Docker Engine APIs and utilizing them to deploy containers that download and execute a coin miner. These containers then use scripts to spread to other systems. | Continue reading


@bleepingcomputer.com | 6 years ago

Trivial Bug in X.Org Gives Root Permission on Linux and BSD Systems

A vulnerability that is trivial to exploit allows privilege escalation to root level on Linux and BSD distributions using X.Org server, the open source implementation of the X Window System that offers the graphical environment. | Continue reading


@bleepingcomputer.com | 6 years ago