01 Jun “Sign in with Apple” vulnerability earns researcher $100,000 Remember seeing that slick “Sign in with Apple” button across many websites and apps? It turns out that a vulnerability allowed attackers to log in to sites using any Apple ID. […]
01 Jun Web Browsers still allow drive-by-downloads in 2020 It’s 2020, and numerous browsers still allow drive-by-downloads from what is meant to be secure contexts such as sandboxed iframes. […]
01 Jun Ransomware locks down the Nipissing First Nation The Nipissing First Nation administration stopped a ransomware attack in its tracks but not soon enough to prevent disruption of communications. […]
31 May Office 365 to give detailed info on malicious email attachments Microsoft will provide Office 365 Advanced Threat Protection (ATP) users with more details on malware samples and malicious URLs discovered following detonation. […]
30 May List of well-known web sites that port scan their visitors Many well-known and heavily used web sites are using a fraud protection script that port scans your local computer for remote access programs. […]
30 May Amtrak resets user passwords after Guest Rewards data breach The National Railroad Passenger Corporation (Amtrak) disclosed a data breach that led to the exposure of personal information of some Guest Rewards members. […]
29 May The Week in Ransomware – May 29th 2020 – Quiet before the storm? For the most part, this week has been fairly quiet with not a lot of new ransomware released and only a few large-scale ransomware attacks. […]
29 May Nworm: TrickBot gang’s new stealthy malware spreading module The Trickbot banking trojan has evolved once again with a new malware spreading module that uses a stealth mode to quietly infect Windows domain controllers without being detected. […]
29 May Valak malware steals credentials from Microsoft Exchange servers Classified initially as a malware loader, Valak has morphed into an information stealer that targets Microsoft Exchange servers to rob email login credentials and certificates from enterprises. […]
29 May Highly-targeted attacks on industrial sector hide payload in images Attackers looking to steal employee credentials from organizations tied to the industrial sector deployed highly-targeted operations that delivered malicious PowerShell scripts in images. […]