Oct 3, 2018

APT report for 2018-10-02

TRANSNATIONAL / UNKNOWN

  1. Cyber Threat Landscape: How it’s Evolving & How to Respond
  2. Formjacking attacks spike as Magecart sets sites on ecommerce
  3. Formjacking attacks spike as Magecart sets sights on ecommerce

CHINA

Nothing to report

INDIA

Nothing to report

NORTH KOREA

  1. NOKKI Malware Sports Mysterious Link to Reaper APT Group
  2. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  3. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  4. Dogcall Rat links NOKKI malware with Reaper group - indicators provided

PAKISTAN

Nothing to report

VIETNAM

Nothing to report

IRAN

Nothing to report

LEBANON

Nothing to report

PALESTINE

Nothing to report

SAUDI ARABIA

Nothing to report

UNITED ARAB EMIRATES

Nothing to report

RUSSIA

Nothing to report

UKRAINE

Nothing to report

Platform report for 2018-10-02

WINDOWS

  1. Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
  2. Following a Trail of Confusion: PowerShell in Malicious Office Documents
  3. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  4. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  5. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  6. Use Windows, macOS? Don’t be hacked by PDF, patch these critical Adobe flaws now
  7. Windows Defender exclusions reek of malware
  8. AV-TEST Rates Check Point’s SandBlast Agent as a Top Product in Corporate Endpoint Protection
  9. Adobe fixes 47 critical flaws in Acrobat and Reader
  10. 86 Vulnerabilities Fixed with Adobe Security Updates for Adobe Acrobat and Reader
  11. Use Windows, macOS? Don't be hacked by PDF, patch these critical Adobe flaws now
  12. CVE-2018-8373: Hackers’ best partner to spread Trojans
  13. Adobe Patches 86 Vulnerabilities in Acrobat Products
  14. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
  15. Telegram vulnerability causes IP address leaking
  16. Hackers use malicious content delivery system to target iOS device
  17. Adobe Releases Security Updates for Acrobat that Fix 86 Vulnerabilities

LINUX

  1. Telegram vulnerability causes IP address leaking

UNIX

  1. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  2. TA18-275A: HIDDEN COBRA – FASTCash Campaign

ANDROID

  1. Google Patches Critical Vulnerabilities in Android OS
  2. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  3. Fortnite gamers targeted by data theft malware
  4. Boffins Tricks Password Protection Using Imposter Apps
  5. Cyber Threat Landscape: How it’s Evolving & How to Respond
  6. Researchers use Android password managers to make phishing attacks more practical
  7. Vulnerable Android password managers make phishing attacks easier
  8. Telegram vulnerability causes IP address leaking
  9. Hackers use malicious content delivery system to target iOS device

IOS

  1. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  2. Hackers use malicious content delivery system to target iOS device

MACOS

  1. Use Windows, macOS? Don’t be hacked by PDF, patch these critical Adobe flaws now
  2. Adobe fixes 47 critical flaws in Acrobat and Reader
  3. 86 Vulnerabilities Fixed with Adobe Security Updates for Adobe Acrobat and Reader
  4. Use Windows, macOS? Don't be hacked by PDF, patch these critical Adobe flaws now
  5. Adobe Patches 86 Vulnerabilities in Acrobat Products
  6. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical

Threat report for 2018-10-02

DATA BREACH

  1. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  2. Financial Sector Data Breaches Soar Despite Heavy Security Spending
  3. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  4. Gwinnett Medical Center investigating possible data breach
  5. Fortnite gamers targeted by data theft malware
  6. Nielsen warns of Chinese influence campaign, but not with midterms
  7. Apollo Data Breach Leads To More Than 200 Million Contact Records Stolen
  8. The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
  9. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  10. UK Conservative Party Conference dedicated app leaks attendee data
  11. Breaking bank security: Record theft rises to new heights
  12. Facebook could face $1.63bn fine under GDPR over latest data breach
  13. How #livechatsoftware leaked
  14. UN Sensitive Information Exposed Publicly Due to Neglected Security Settings
  15. #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
  16. Facebook Hacked: 50 Million Users' Data Exposed
  17. #SecurityNews: #Tory App Snafu exposes Ministers’ personal info including phone numbers and other personal details of Cabinet ministers, as the
  18. Telegram vulnerability causes IP address leaking
  19. Facebook may be fined up to $1.63 billion due to data breach
  20. Wait, this isn't The Onion... "FBI fitness app asks users to agree to 'all of their activities monitored and recorded'"
  21. #Video: Bringing all of your #data together under a single management portfolio, under a single #database, allows your organization to

DENIAL-OF-SERVICE

  1. Torii botnet, probably the most sophisticated IoT botnet of ever
  2. California Governor Signs Bill Requiring Bots to Disclose Their True Identity
  3. Rarely a week goes by without reports of a large and damaging #DDoS attack against a major business. Techniques are
  4. Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai
  5. Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation
  6. Torii malware could be gateway to more sophisticated IoT botnet attacks

MALVERTISING

Nothing to report

PHISHING

  1. Cyber criminals using lookalike online shopping domains to phish buyers
  2. Nearly 50% of businesses have yet to take control of password security - report
  3. Sophisticated Voice Phishing Scams
  4. WifiPhisher – WiFi Crack and Phishing Framework
  5. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  6. Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'
  7. ThreatList: Password Hygiene Remains Lackluster in Global Businesses
  8. Boffins Tricks Password Protection Using Imposter Apps
  9. Strengthen your security with Avast password generator | Avast
  10. Researchers use Android password managers to make phishing attacks more practical
  11. Vulnerable Android password managers make phishing attacks easier
  12. True password behaviors in the workplace revealed
  13. Sites that use Facebook login could be affected by hack
  14. ​NZ customs can now demand phone or laptop passwords
  15. When you need to make a new #Password, what do you do? The easiest and most secure way is to
  16. At #MSIgnite, @Microsoft declared "an end to era of passwords" with an update to its Authenticator app, which will allow

WEB DEFACEMENT

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements

MALWARE

  1. Cyber criminals using lookalike online shopping domains to phish buyers
  2. Canadian restaurant chain suffers country-wide outage after malware outbreak
  3. Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
  4. Researchers Link New NOKKI Malware to North Korean Actor
  5. NOKKI Malware Sports Mysterious Link to Reaper APT Group
  6. Malware 101: The Malware Tools That Attackers Use
  7. Following a Trail of Confusion: PowerShell in Malicious Office Documents
  8. Google taking new steps to prevent malicious Chrome extensions
  9. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  10. Enabling Enterprise-Grade Hybrid Cloud Data Processing with SAP and Cisco – Part 2
  11. A remote access #Trojan -- dubbed #GravityRAT -- was discovered by Cisco Talos (@TalosSecurity) to be checking for #antimalware sandboxes.
  12. Danabot Banking Malware Now Targeting Banks in the U.S.
  13. Dogcall Rat links NOKKI malware with Reaper group - indicators provided
  14. The MITRE ATT&CK Framework: Command and Control
  15. Ransomware attacks via RDP on the rise | Avast
  16. Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
  17. Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
  18. World Cup may have distracted malware hackers
  19. Microsoft Detection Tools Sniff Out Fileless Malware
  20. Google Cracks Down on Malicious Chrome Extensions in Major Update
  21. Fortnite gamers targeted by data theft malware
  22. Windows Defender exclusions reek of malware
  23. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  24. Report: Zoho's domain regularly exploited to move keylogger data
  25. A Staggering Amount of Stolen Data is Heading to Zoho Domains
  26. AV-TEST Rates Check Point’s SandBlast Agent as a Top Product in Corporate Endpoint Protection
  27. Malware Less Common in Q2, Still Top Attack Method
  28. Malware Less Common in Q2, Still Top Attack Method
  29. Alphabet's @chroniclesec unveiled #VirusTotal Enterprise, a new version of the file scanning service designed specifically for enterprise customers. By @RobWright22
  30. Fruitfly Mac malware creator used it to spy on minors; FBI discloses technique
  31. CVE-2018-8373: Hackers’ best partner to spread Trojans
  32. Desktop Telegram users showing off not only their silly selfies but also their IP addresses
  33. New Type of Malware Developed by Russian Hackers Eludes Discovery
  34. The Army is working toward a cyber domain doctrine
  35. The MITRE ATT&CK Framework: Command and Control
  36. Improving #mobilesecurity programs to detect
  37. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
  38. A group of #malware was discovered targeting public SSH servers. However, certain #IPaddresses are avoided. Discover how this is possible
  39. Telegram vulnerability causes IP address leaking
  40. Hackers use malicious content delivery system to target iOS device
  41. Torii malware could be gateway to more sophisticated IoT botnet attacks

EXPLOIT

  1. .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
  2. Report: Zoho's domain regularly exploited to move keylogger data
  3. Facebook Breach: Attackers Exploited Privacy Feature
  4. SQL injection explained: How these attacks work and how to prevent them

VULNERABILITY

  1. PDF patch time: fixes land for over 100 flaws in Adobe's and Foxit's PDF software
  2. Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws
  3. Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
  4. Google Patches Critical Vulnerabilities in Android OS
  5. Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
  6. Foxit Reader Update Patches Over 100 Vulnerabilities
  7. Use Windows, macOS? Don’t be hacked by PDF, patch these critical Adobe flaws now
  8. New study finds 5 of every 6 routers are inadequately updated for security flaws
  9. .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
  10. Adobe Releases Updates For 85 PDF Related CVEs
  11. Nine NAS Bugs Open LenovoEMC, Iomega Devices To Attack
  12. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  13. Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader
  14. Adobe fixes 47 critical flaws in Acrobat and Reader
  15. 86 Vulnerabilities Fixed with Adobe Security Updates for Adobe Acrobat and Reader
  16. Use Windows, macOS? Don't be hacked by PDF, patch these critical Adobe flaws now
  17. CVE-2018-8373: Hackers’ best partner to spread Trojans
  18. Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
  19. Adobe Patches 86 Vulnerabilities in Acrobat Products
  20. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
  21. Telegram vulnerability causes IP address leaking
  22. Security Update for Foxit PDF Reader Fixes 118 Vulnerabilities
  23. Adobe Releases Security Updates for Acrobat that Fix 86 Vulnerabilities

Region brief for 2018-10-02

ASIA

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Researchers Link New NOKKI Malware to North Korean Actor
  3. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  4. Nielsen warns of Chinese influence campaign, but not with midterms
  5. Report: Zoho's domain regularly exploited to move keylogger data
  6. A Staggering Amount of Stolen Data is Heading to Zoho Domains
  7. Hackers use malicious content delivery system to target iOS device

OCEANIA

  1. Danabot Banking Malware Now Targeting Banks in the U.S.

NORTH AMERICA

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Canadian restaurant chain suffers country-wide outage after malware outbreak
  3. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  4. California Governor Signs Bill Requiring Bots to Disclose Their True Identity
  5. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  6. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  7. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  8. Danabot Banking Malware Now Targeting Banks in the U.S.
  9. Ransomware attacks via RDP on the rise | Avast
  10. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  11. Fortnite gamers targeted by data theft malware
  12. Nielsen warns of Chinese influence campaign, but not with midterms
  13. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  14. Cyber Threat Landscape: How it’s Evolving & How to Respond
  15. #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
  16. Facebook may be fined up to $1.63 billion due to data breach

SOUTH AMERICA

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea

EUROPE

  1. Torii botnet, probably the most sophisticated IoT botnet of ever
  2. World Cup may have distracted malware hackers
  3. Microsoft Detection Tools Sniff Out Fileless Malware
  4. Gwinnett Medical Center investigating possible data breach
  5. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  6. Fortnite gamers targeted by data theft malware
  7. Cyber Threat Landscape: How it’s Evolving & How to Respond
  8. UK Conservative Party Conference dedicated app leaks attendee data
  9. New Type of Malware Developed by Russian Hackers Eludes Discovery
  10. Sites that use Facebook login could be affected by hack

AFRICA

Nothing to report

Sector brief for 2018-10-02

HEALTHCARE

  1. Gwinnett Medical Center investigating possible data breach

TRANSPORT

  1. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  2. UN Sensitive Information Exposed Publicly Due to Neglected Security Settings

BANKING & FINANCE

  1. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  2. Financial Sector Data Breaches Soar Despite Heavy Security Spending
  3. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  4. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  5. Danabot Banking Malware Now Targeting Banks in the U.S.
  6. World Cup may have distracted malware hackers
  7. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  8. Cyber Threat Landscape: How it’s Evolving & How to Respond
  9. Strengthen your security with Avast password generator | Avast
  10. Breaking bank security: Record theft rises to new heights

INFORMATION & TELECOMMUNICATION

  1. Torii botnet, probably the most sophisticated IoT botnet of ever
  2. Following a Trail of Confusion: PowerShell in Malicious Office Documents
  3. Google taking new steps to prevent malicious Chrome extensions
  4. Google Patches Critical Vulnerabilities in Android OS
  5. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  6. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  7. Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'
  8. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  9. Ransomware attacks via RDP on the rise | Avast
  10. Microsoft Detection Tools Sniff Out Fileless Malware
  11. Google Cracks Down on Malicious Chrome Extensions in Major Update
  12. Fortnite gamers targeted by data theft malware
  13. Boffins Tricks Password Protection Using Imposter Apps
  14. Cyber Threat Landscape: How it’s Evolving & How to Respond
  15. Researchers use Android password managers to make phishing attacks more practical
  16. Malware Less Common in Q2, Still Top Attack Method
  17. Facebook could face $1.63bn fine under GDPR over latest data breach
  18. Malware Less Common in Q2, Still Top Attack Method
  19. CVE-2018-8373: Hackers’ best partner to spread Trojans
  20. Facebook Breach: Attackers Exploited Privacy Feature
  21. UN Sensitive Information Exposed Publicly Due to Neglected Security Settings
  22. #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
  23. Vulnerable Android password managers make phishing attacks easier
  24. Facebook Hacked: 50 Million Users' Data Exposed
  25. Rarely a week goes by without reports of a large and damaging #DDoS attack against a major business. Techniques are
  26. #SecurityNews: #Tory App Snafu exposes Ministers’ personal info including phone numbers and other personal details of Cabinet ministers, as the
  27. Sites that use Facebook login could be affected by hack
  28. Facebook may be fined up to $1.63 billion due to data breach
  29. Wait, this isn't The Onion... "FBI fitness app asks users to agree to 'all of their activities monitored and recorded'"
  30. When you need to make a new #Password, what do you do? The easiest and most secure way is to
  31. #Video: Bringing all of your #data together under a single management portfolio, under a single #database, allows your organization to
  32. At #MSIgnite, @Microsoft declared "an end to era of passwords" with an update to its Authenticator app, which will allow

FOOD

Nothing to report

WATER

Nothing to report

ENERGY

  1. Malware 101: The Malware Tools That Attackers Use

GOVERNMENT & PUBLIC SERVICE

  1. California Governor Signs Bill Requiring Bots to Disclose Their True Identity
  2. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities

Daily brief for 2018-10-02

ASIA

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Researchers Link New NOKKI Malware to North Korean Actor
  3. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  4. Nielsen warns of Chinese influence campaign, but not with midterms
  5. Report: Zoho's domain regularly exploited to move keylogger data
  6. A Staggering Amount of Stolen Data is Heading to Zoho Domains
  7. Hackers use malicious content delivery system to target iOS device

WORLD

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Canadian restaurant chain suffers country-wide outage after malware outbreak
  3. Torii botnet, probably the most sophisticated IoT botnet of ever
  4. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  5. California Governor Signs Bill Requiring Bots to Disclose Their True Identity
  6. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  7. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  8. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  9. Danabot Banking Malware Now Targeting Banks in the U.S.
  10. Ransomware attacks via RDP on the rise | Avast
  11. World Cup may have distracted malware hackers
  12. Microsoft Detection Tools Sniff Out Fileless Malware
  13. Gwinnett Medical Center investigating possible data breach
  14. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  15. Fortnite gamers targeted by data theft malware
  16. Nielsen warns of Chinese influence campaign, but not with midterms
  17. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  18. Cyber Threat Landscape: How it’s Evolving & How to Respond
  19. UK Conservative Party Conference dedicated app leaks attendee data
  20. New Type of Malware Developed by Russian Hackers Eludes Discovery
  21. #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
  22. Sites that use Facebook login could be affected by hack
  23. Facebook may be fined up to $1.63 billion due to data breach

ATTACKS

  1. Cyber criminals using lookalike online shopping domains to phish buyers
  2. Nearly 50% of businesses have yet to take control of password security - report
  3. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  4. Sophisticated Voice Phishing Scams
  5. Torii botnet, probably the most sophisticated IoT botnet of ever
  6. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  7. California Governor Signs Bill Requiring Bots to Disclose Their True Identity
  8. Financial Sector Data Breaches Soar Despite Heavy Security Spending
  9. WifiPhisher – WiFi Crack and Phishing Framework
  10. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  11. Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'
  12. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  13. Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements
  14. Gwinnett Medical Center investigating possible data breach
  15. Fortnite gamers targeted by data theft malware
  16. Nielsen warns of Chinese influence campaign, but not with midterms
  17. Apollo Data Breach Leads To More Than 200 Million Contact Records Stolen
  18. ThreatList: Password Hygiene Remains Lackluster in Global Businesses
  19. The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
  20. Boffins Tricks Password Protection Using Imposter Apps
  21. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  22. Strengthen your security with Avast password generator | Avast
  23. UK Conservative Party Conference dedicated app leaks attendee data
  24. Researchers use Android password managers to make phishing attacks more practical
  25. Breaking bank security: Record theft rises to new heights
  26. Facebook could face $1.63bn fine under GDPR over latest data breach
  27. How #livechatsoftware leaked
  28. UN Sensitive Information Exposed Publicly Due to Neglected Security Settings
  29. #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
  30. Vulnerable Android password managers make phishing attacks easier
  31. Facebook Hacked: 50 Million Users' Data Exposed
  32. True password behaviors in the workplace revealed
  33. Rarely a week goes by without reports of a large and damaging #DDoS attack against a major business. Techniques are
  34. #SecurityNews: #Tory App Snafu exposes Ministers’ personal info including phone numbers and other personal details of Cabinet ministers, as the
  35. Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai
  36. Telegram vulnerability causes IP address leaking
  37. Sites that use Facebook login could be affected by hack
  38. Facebook may be fined up to $1.63 billion due to data breach
  39. Wait, this isn't The Onion... "FBI fitness app asks users to agree to 'all of their activities monitored and recorded'"
  40. ​NZ customs can now demand phone or laptop passwords
  41. Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation
  42. When you need to make a new #Password, what do you do? The easiest and most secure way is to
  43. #Video: Bringing all of your #data together under a single management portfolio, under a single #database, allows your organization to
  44. At #MSIgnite, @Microsoft declared "an end to era of passwords" with an update to its Authenticator app, which will allow
  45. Torii malware could be gateway to more sophisticated IoT botnet attacks

THREATS

  1. Cyber criminals using lookalike online shopping domains to phish buyers
  2. PDF patch time: fixes land for over 100 flaws in Adobe's and Foxit's PDF software
  3. Canadian restaurant chain suffers country-wide outage after malware outbreak
  4. Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws
  5. Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
  6. Researchers Link New NOKKI Malware to North Korean Actor
  7. NOKKI Malware Sports Mysterious Link to Reaper APT Group
  8. Malware 101: The Malware Tools That Attackers Use
  9. Following a Trail of Confusion: PowerShell in Malicious Office Documents
  10. Google taking new steps to prevent malicious Chrome extensions
  11. Google Patches Critical Vulnerabilities in Android OS
  12. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  13. Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
  14. Enabling Enterprise-Grade Hybrid Cloud Data Processing with SAP and Cisco – Part 2
  15. Foxit Reader Update Patches Over 100 Vulnerabilities
  16. A remote access #Trojan -- dubbed #GravityRAT -- was discovered by Cisco Talos (@TalosSecurity) to be checking for #antimalware sandboxes.
  17. Danabot Banking Malware Now Targeting Banks in the U.S.
  18. Dogcall Rat links NOKKI malware with Reaper group - indicators provided
  19. The MITRE ATT&CK Framework: Command and Control
  20. Ransomware attacks via RDP on the rise | Avast
  21. Use Windows, macOS? Don’t be hacked by PDF, patch these critical Adobe flaws now
  22. Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
  23. Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
  24. World Cup may have distracted malware hackers
  25. New study finds 5 of every 6 routers are inadequately updated for security flaws
  26. Microsoft Detection Tools Sniff Out Fileless Malware
  27. .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
  28. Adobe Releases Updates For 85 PDF Related CVEs
  29. Nine NAS Bugs Open LenovoEMC, Iomega Devices To Attack
  30. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  31. Google Cracks Down on Malicious Chrome Extensions in Major Update
  32. Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader
  33. Fortnite gamers targeted by data theft malware
  34. Windows Defender exclusions reek of malware
  35. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  36. Report: Zoho's domain regularly exploited to move keylogger data
  37. A Staggering Amount of Stolen Data is Heading to Zoho Domains
  38. AV-TEST Rates Check Point’s SandBlast Agent as a Top Product in Corporate Endpoint Protection
  39. Adobe fixes 47 critical flaws in Acrobat and Reader
  40. 86 Vulnerabilities Fixed with Adobe Security Updates for Adobe Acrobat and Reader
  41. Malware Less Common in Q2, Still Top Attack Method
  42. Malware Less Common in Q2, Still Top Attack Method
  43. Alphabet's @chroniclesec unveiled #VirusTotal Enterprise, a new version of the file scanning service designed specifically for enterprise customers. By @RobWright22
  44. Fruitfly Mac malware creator used it to spy on minors; FBI discloses technique
  45. Use Windows, macOS? Don't be hacked by PDF, patch these critical Adobe flaws now
  46. CVE-2018-8373: Hackers’ best partner to spread Trojans
  47. Man-in-the-middle attacks allow hackers to intercept, send and receive data to and from your device undetected until the transaction is
  48. Desktop Telegram users showing off not only their silly selfies but also their IP addresses
  49. Facebook Breach: Attackers Exploited Privacy Feature
  50. New Type of Malware Developed by Russian Hackers Eludes Discovery
  51. The Army is working toward a cyber domain doctrine
  52. Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
  53. The MITRE ATT&CK Framework: Command and Control
  54. SQL injection explained: How these attacks work and how to prevent them
  55. Improving #mobilesecurity programs to detect
  56. Adobe Patches 86 Vulnerabilities in Acrobat Products
  57. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
  58. A group of #malware was discovered targeting public SSH servers. However, certain #IPaddresses are avoided. Discover how this is possible
  59. Telegram vulnerability causes IP address leaking
  60. Security Update for Foxit PDF Reader Fixes 118 Vulnerabilities
  61. Hackers use malicious content delivery system to target iOS device
  62. Adobe Releases Security Updates for Acrobat that Fix 86 Vulnerabilities
  63. Torii malware could be gateway to more sophisticated IoT botnet attacks

CRIME

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  3. Google taking new steps to prevent malicious Chrome extensions
  4. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  5. Danabot Banking Malware Now Targeting Banks in the U.S.
  6. Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements
  7. World Cup may have distracted malware hackers
  8. Fortnite gamers targeted by data theft malware
  9. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  10. Cyber Threat Landscape: How it’s Evolving & How to Respond
  11. Strengthen your security with Avast password generator | Avast
  12. Report: Zoho's domain regularly exploited to move keylogger data
  13. A Staggering Amount of Stolen Data is Heading to Zoho Domains
  14. Breaking bank security: Record theft rises to new heights
  15. Fruitfly Mac malware creator used it to spy on minors; FBI discloses technique

POLITICS

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  3. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  4. Fruitfly Mac malware creator used it to spy on minors; FBI discloses technique
  5. UN Sensitive Information Exposed Publicly Due to Neglected Security Settings