21 Nov Card Skimmer Group Replaces Checkout Page to Steal Payment Info A payment service platform’s checkout page was recently cloned by the threat actors behind a web skimming campaign that harvested and stole credit card information from an online shop’s customers. […]
21 Nov Microsoft Outlook for Android Gets Spoofing Vulnerability Fix Microsoft has released an update for Microsoft Outlook for Android that fixes a spoofing vulnerability in the application that could allow an attacker to compromise the device. […]
21 Nov Google Adds $1.5 Million Top Reward to Android Bug Bounty Program Google is expanding the Android bug bounty program with new data exfiltration and lockscreen bypass categories as well as a $1 million reward for critical vulnerabilities targeting the Titan M chip. […]
21 Nov DePriMon Malware Registers Itself as a Windows Print Monitor A malware downloader being dubbed DePriMon registers itself as a Windows print monitor in order to gain persistence on infected user’s computers. […]
21 Nov New RIPlace Bypass Evades Windows 10, AV Ransomware Protection A new ransomware bypass technique called RIPlace requires only a few lines of code to bypass ransomware protection features built into many security products and Windows 10. […]
20 Nov Millions of Sites Exposed by Flaw in Jetpack WordPress Plugin Admins and owners of WordPress websites are urged to immediately apply the Jetpack 7.9.1 critical security update to prevent potential attacks that could abuse a vulnerability present since Jetpack 5.1. […]
20 Nov uBlock Origin Now Blocks Sneaky First-Party Trackers in Firefox uBlock Origin on Firefox can now block first-party tracking scripts that attempt to bypass filters and rules by utilizing DNS CNAME records to load scripts from a third-party domain. […]
20 Nov New Banking Trojan Infects Victims via McDonald’s Malvertising A new banking Trojan distributed via malvertising and malspam campaigns using fake McDonald’s coupons as lures was observed while attempting to steal financial information from potential Latin American victim. […]
20 Nov Ransomware Gangs Adopt APT Tactics in Targeted Attacks Ransomware operators are moving away from mass volume attacks and partnering with specialists who use APT techniques to provide stealthy infiltration and network-wide encryption capabilities. […]
20 Nov Thousands of Enterprises At Risk Due to Oracle EBS Critical Flaws Two critical security vulnerabilities discovered in Oracle’s E-Business Suite (EBS) could allow potential attackers to take full control over a company’s entire enterprise resource planning (ERP) solution. […]