Threat report for 2018-10-19
DATA BREACH & DATA LOSS
- AWS FreeRTOS Bugs Allow Compromise of IoT Devices
- Campaign 2018: Artificial intelligence is automating attacks on political campaigns
- Chinese Hackers Use 'Datper' Trojan in Recent Campaign
- A Pentagon #DataBreach exposed data on at least 30,000 individuals, but other details about the incident are still scarce. By
- Campaign 2018: Artificial Intelligence Is Automating Attacks On Political Campaigns
- New RTF-based Campaign Distributing Agent Tesla and Loki Malware
- Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
- US Voter Leak Hits Tea Party Organization
- VestaCP users warned about possible server compromise
- jQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew
- Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
- Campaign launched to protect ethical hackers in the Americas
- The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
- Facepunch 2016 breach exposed 343,000 users
- Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
- ADHA's non-process for releasing My Health Record data revealed
- MikroTik routers targeted by cryptomining campaign | Avast
- Vulnerability in Tumblr could have compromise users’ account data
- Poor security practices and access to hacking services are making it easy for #cybercriminals to compromise business email, research reveals:
DENIAL-OF-SERVICE
- New DDoS Malware Infects Open-Source Web Hosting Software
- Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'
- DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report
MALVERTISING
Nil
PHISHING
- Password and credit card-stealing Azorult malware adds new tricks
- AISA 2018: Hunting for phishing kits
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
- #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.
WEB DEFACEMENT
Nil
BOTNET
- Ok now, which one of you is running this Twitter botnet of fake infosec professionals?
RANSOMWARE
- City Pays $2,000 in Computer Ransomware Attack
- Water Utility ONWASA Hit by Ransomware Attack
- Madison County Computer Systems Face a Ransomware Attack
- The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
- Top 4 tips to avoid getting hit by ransomware
- Onslow County Utility Hit with Ransomware Attack
CRYPTOMINING & CRYPTOCURRENCIES
- Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
- MikroTik routers targeted by cryptomining campaign | Avast
- Fraudster Targets Cryptocurrency Wallets with a Variety of Info Stealers
MALWARE
- Small or Big Business, Malware Hits Everyone
- Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
- Chinese Hackers Use 'Datper' Trojan in Recent Campaign
- Password and credit card-stealing Azorult malware adds new tricks
- SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
- New DDoS Malware Infects Open-Source Web Hosting Software
- America’s First: US Leads in Global Malware C2 Distribution
- New RTF-based Campaign Distributing Agent Tesla and Loki Malware
- Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
- The Golden Age of Malware
- LuminosityLink RAT author sentenced to 30 years in prison
- Inside Safari Extensions | Malware’s Golden Key to User Data
- .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
- ADHA's non-process for releasing My Health Record data revealed
- APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands
- Canberra competence shines in day of PM domain lapses and tortured analogies
EXPLOIT
- NSA-Linked 'DarkPulsar' Exploit Tool Detailed
VULNERABILITY
- libssh Vulnerability: Is WatchGuard Affected?
- 0-Day in jQuery Plugin Impacts Thousands of Applications
- Fixing a CSRF Vulnerability
- This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
- AWS FreeRTOS Bugs Allow Compromise of IoT Devices
- Drupal dev team fixed Remote Code Execution flaws in the popular CMS
- Flaw in Libssh Grants Admin Control to Servers
- FreeRTOS Vulnerabilities Expose Many Systems to Attacks
- Linksys E Series Vulnerabilities
- Google warns Apple: Missing bugs in your security bulletins are 'disincentive to patch'
- jQuery Zero-Day Was Exploited For At Least Three Years
- A Serious Security Flaw Found in LibSSH
- In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
- Splunk addressed several vulnerabilities in Enterprise and Light products
- Serious D-Link router security flaws may never be patched
- Scams and flaws: Why we get duped
- Remote Code Execution Flaws Patched in Drupal
- Tumblr bug bounty program detects flaw, no user info lost
- .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
- The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
- Critical Flaw Found in Streaming Library Used by VLC and Other Media Players
- Drupal Remote Code Execution Vulnerability Alert
- Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
- Splunk Patches Several Flaws in Enterprise, Light Products
- Vulnerability in Tumblr could have compromise users’ account data
- Three critical vulnerabilities can be chained to take full control of D-Link routers
- Zero-day in popular jQuery plugin actively exploited for at least three years
- Tumblr serious vulnerability can reveal everyone information
- Critical Flaws Found in Amazon FreeRTOS IoT Operating System