Nov 19, 2018

Threat report for 2018-11-18

DATA BREACH & DATA LOSS

  1. Instagram glitch exposed some user passwords
  2. SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more
  3. According to the @FBI's Internet #CrimeReport, business email compromise attacks cost more than $676 million in 2017. Learn more from
  4. See how SearchLight identifies when your data is exposed, your brand is abused, or your company is mentioned on the

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. Hacking Gmail’s UX with from fields for phishing attacks
  2. To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords
  3. "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy

WEB DEFACEMENT

Nil

BOTNET

Nil

RANSOMWARE

  1. Ransomware Remediation for Comprehensive Protection
  2. A new ransomware -- dubbed #Thanatos #ransomware -- was found encrypting data but not decrypting it despite victims paying the

CRYPTOMINING & CRYPTOCURRENCIES

  1. Twitter Bitcoin Scam Account Hacks Were Caused By Third-Party Apps
  2. OSX.Dummy #malware has been discovered to use chat platforms in order to target #cryptocurrency investors. Learn more with expert @lewisnic

MALWARE

  1. Hackers May Exploit Microsoft PowerPoint For Malware Attacks
  2. In @usnistgo's draft on 'Vetting the #Security of #MobileApplications,' several key general requirements are discussed. However, the process could be
  3. OSX.Dummy #malware has been discovered to use chat platforms in order to target #cryptocurrency investors. Learn more with expert @lewisnic
  4. The machine learning technology used by Google to detect malware on APK files

EXPLOIT

  1. Hackers May Exploit Microsoft PowerPoint For Malware Attacks
  2. "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy

VULNERABILITY

  1. An iPhone X Vulnerability Allows Hackers To Access Deleted Pictures
  2. Processor Woes Continue: 7 New Meltdown and Spectre Bugs Arrive Weeks Before The Holidays
  3. "Keep in mind that it's not just users who can find and exploit #SQLinjection, but business logic flaws, password policy