At least one group of hackers has learned a new trick you need to be aware of. Security researchers at Kapersky Lab have discovered a malicious campaign-in-progress that is using event logs to store malware. That is a technique that has not been seen or documented until now. This new …
Beware Of New Backdoor Malware Targeting Linux Users
The name Kevin Beaumont may not be familiar to you, but if you’re a Linux or Solaris user, he may have just saved you a whole lot of grief. Recently, Mr. Beaumont discovered a stealthy backdoor malware that has been quietly infecting Linux and Solaris SPARC systems for more than …
New Phishing Scams Using Twitter Account Emails
Hackers around the world are increasingly targeting verified Twitter accounts with emails designed to pilfer your Twitter login credentials. Verified Twitter accounts differ from standard Twitter accounts in that they sport a large blue check mark next to the user’s name, which indicates that the person who owns the account …
Tricky Ransomware Encrypts Small Data But Overwrites Large Data
The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty. Called Onyx, outwardly, the operation does what most ransomware campaigns do. It gets inside a corporate network, exfiltrates the data that it wants, then seems to encrypt the rest, and then threatens to release the files to the …
Popular Service Being Used To Send Phishing Emails
Google SMTP relay service is wildly popular and used every day by legions of users. Unfortunately, hackers around the world are aware of this and increasingly they’ve begun abusing the SMTP relay service. The basic idea is as follows. Some clever hackers have figured out that they can bypass email …
Security Warnings Coming To Certain Google Apps To Help Users
Google has been making some fantastic changes to bolster user security in recent weeks. That includes changes to their Google Play Store that will require developers to disclose exactly what data they plan to track and collect when users install the apps they create. In a related vein, the tech …
New Delivery Method For Ransomware Discovered Called Bumblebee
Some interesting and disturbing changes are afoot in the hacking world. It appears that the TrickBot gang is now working for the Conti Syndicate. TrickBot is a well-known group of botnet developers responsible for the creation of the BazarLoader. BazarLoader has been used by Conti in the past as their …
Microsoft Edge Browser To Get Free Limited VPN
There’s a big change coming to the Microsoft Edge browser. Big enough that it may prompt some users to switch to Edge. Recently, Microsoft announced that they’ll be adding a free built-in VPN (Virtual Private Network) service to Edge as part of a long-anticipated security upgrade. Called “Edge Secure Network,” …
Users Without Internet Explorer Updates Are Vulnerable To Malware
Researchers at Bitdefender have discovered a new malware campaign. This one uses an attack method that has fallen out of favor in recent months, called the Exploit Kit. Exploit Kits used to be all the rage. Flash Player was a popular target for Exploit Kit based attacks but it is …
Google Assistant Tool Will Automate Password Changes
A handy new Google Assistant is coming soon to a device near you. The new feature is designed to automate the frustrating and often time-consuming task of changing your passwords after a breach. This information is according to a tweet from Max Weinbach and a separate report from a group …