Category: BleepingComputer

Scammers hacked Twitter and hijacked accounts using admin tool

Read the original article: Scammers hacked Twitter and hijacked accounts using admin tool Hackers were able to hijack dozens of high-profile Twitter accounts on Wednesday after gaining access to internal user administration tools and systems. […]   Advertise on IT Security…

Cisco fixes critical pre-auth flaws allowing router takeover

Read the original article: Cisco fixes critical pre-auth flaws allowing router takeover Cisco today has released security updates to address critical remote code execution (RCE), authentication bypass, and static default credential vulnerabilities affecting multiple router and firewall devices that could…

Microsoft removes Windows 10 2004 Thunderbolt dock update block

Read the original article: Microsoft removes Windows 10 2004 Thunderbolt dock update block Microsoft is removing a Windows 10, version 2004 safeguard hold after resolving a known issue that was triggering blue screens and stop errors when plugging or unplugging Thunderbolt docks…

Microsoft fixes Windows 10 issue causing reboots, LSASS crashes

Read the original article: Microsoft fixes Windows 10 issue causing reboots, LSASS crashes Microsoft today fixed a known issue that was causing Local Security Authority Subsystem Service (LSASS) crashes and forced system reboots on some Windows devices. […]   Advertise on IT…

WhatsApp is down, users reporting worldwide outage

Read the original article: WhatsApp is down, users reporting worldwide outage WhatsApp is down with users worldwide reporting problems connecting to the messaging platform. […]   Advertise on IT Security News. Read the original article: WhatsApp is down, users reporting…

Chrome 84 released with important security enhancements

Read the original article: Chrome 84 released with important security enhancements Google has released Chrome 84 today, July 14th, 2020, to the Stable desktop channel, and it includes numerous security enhancements and new APIs for developers. […]   Advertise on IT…

Adobe fixes critical bugs in Creative Cloud, Media Encoder

Read the original article: Adobe fixes critical bugs in Creative Cloud, Media Encoder Adobe has released security updates to address four critical vulnerabilities that could allow attackers to execute arbitrary code and write arbitrary files on Windows devices running vulnerable versions of…

Malware adds online sandbox detection to evade analysis

Read the original article: Malware adds online sandbox detection to evade analysis Malware developers are now checking if their malware is running in the Any.Run malware analysis service to prevent their malware from being easily analyzed by researchers. […]  …

Malware adds Any.Run sandbox detection to evade analysis

Read the original article: Malware adds Any.Run sandbox detection to evade analysis Malware developers are now checking if their malware is running in the Any.Run malware analysis service to prevent their malware from being easily analyzed by researchers. […]  …

How to protect your Verizon number from SIM swapping attacks

Read the original article: How to protect your Verizon number from SIM swapping attacks Verizon now makes it possible for customers to defend against SIM swapping attacks by enabling the free Number Lock protection feature through the My Verizon app or the My Verizon website. […]…

US Secret Service creates new Cyber Fraud Task Force

Read the original article: US Secret Service creates new Cyber Fraud Task Force The U.S. Secret Service announced the creation of the Cyber Fraud Task Force (CFTF) after the merger of its Financial Crimes Task Forces (FCTFs) and Electronic Crimes Task…

Conti ransomware shows signs of being Ryuk’s successor

Read the original article: Conti ransomware shows signs of being Ryuk’s successor The Conti Ransomware is an upcoming threat targeting corporate networks with new features that allow it to perform quicker and more targeted attacks. There are also indications that…

Conti ransomware shows signs of being a Ryuk successor

Read the original article: Conti ransomware shows signs of being a Ryuk successor The Conti Ransomware is an upcoming threat targeting corporate networks with new features that allow it to perform quicker and more targeted attacks. There are also indications…

Google will ban ads for stalkerware starting August 11

Read the original article: Google will ban ads for stalkerware starting August 11 Google will update its Google Ads Enabling Dishonest Behavior policy to globally ban advertising for spyware and surveillance technology known as stalkerware starting with August 11, 2020.…

Microsoft testing new Windows 10 KDP anti-malware protection

Read the original article: Microsoft testing new Windows 10 KDP anti-malware protection Microsoft is testing a new Windows 10 security feature dubbed Kernel Data Protection (KDP) and designed to block malicious actors from altering Windows drivers and systems’ protected kernel memory as part…

Over 15 billion credentials in circulation on hacker forums

Read the original article: Over 15 billion credentials in circulation on hacker forums At least 15 billion credentials are currently circulating on various hacker forums, giving cybercriminals fodder for account takeover attacks and identity renting services. […]   Advertise on…

Palo Alto Networks fixes another severe flaw in PAN-OS devices

Read the original article: Palo Alto Networks fixes another severe flaw in PAN-OS devices Palo Alto Networks (PAN) today addressed another severe vulnerability found in the PAN-OS GlobalProtect portal and affecting unpatched PAN next-generation firewalls. […]   Advertise on IT…

Microsoft fixes Word, Skype hangs in July Office 2020 updates

Read the original article: Microsoft fixes Word, Skype hangs in July Office 2020 updates Microsoft released the July 2020 non-security Microsoft Office updates with improvements and fixes for issues impacting Windows Installer (MSI) editions of Office 2016 and Office 2013…

ThiefQuest info-stealing Mac wiper gets free decryptor

Read the original article: ThiefQuest info-stealing Mac wiper gets free decryptor Poor coding of the ThiefQuest ransomware in disguise that targets macOS users allows recovery of encrypted files, which would remain lost in lack of a backup. […]   Advertise…

Mitigating critical F5 BIG-IP RCE flaw not enough, bypass found

Read the original article: Mitigating critical F5 BIG-IP RCE flaw not enough, bypass found F5 BIG-IP customers who only applied recommended mitigations and haven’t yet patched their devices against the unauthenticated remote code execution (RCE) CVE-2020-5902 vulnerability are now advised to update them…

Microsoft takes down domains used in COVID-19-related cybercrime

Read the original article: Microsoft takes down domains used in COVID-19-related cybercrime Microsoft took control of domains used by cybercriminals as part of the infrastructure needed to launch phishing attacks designed to exploit vulnerabilities and public fear resulting from the COVID-19 pandemic. […]…

Microsoft Defender ATP web content filtering is now free

Read the original article: Microsoft Defender ATP web content filtering is now free The new Microsoft Defender Advanced Threat Protection (ATP) Web Content Filtering feature will be provided for free to all enterprise customers without the need for an additional partner license.…

EDP energy giant confirms Ragnar Locker ransomware attack

Read the original article: EDP energy giant confirms Ragnar Locker ransomware attack EDP Renewables North America (EDPR NA) confirmed a Ragnar Locker ransomware attack that affected its parent corporation’s systems, the Portuguese multinational energy giant Energias de Portugal (EDP). […]   Advertise…

Ransomware attack on insurance MSP Xchanging affects clients

Read the original article: Ransomware attack on insurance MSP Xchanging affects clients Global IT services and solutions provider DXC Technology announced over the weekend a ransomware attack on systems from its Xchanging subsidiary. […]   Advertise on IT Security News.…

F5 patches critical BIG-IP ADC remote code execution vulnerability

Read the original article: F5 patches critical BIG-IP ADC remote code execution vulnerability F5 Networks (F5) patched a critical remote code execution (RCE) vulnerability found in undisclosed pages of Traffic Management User Interface (TMUI) of the BIG-IP application delivery controller (ADC). […]  …

Windows 10 2004 breaks OneDrive connectivity for some users

Read the original article: Windows 10 2004 breaks OneDrive connectivity for some users Microsoft says that some users might experience OneDrive connectivity issues after updating their devices to Windows 10, version 2004 or enabling Files on Demand in OneDrive. […]   Advertise…

Microsoft Defender ATP now helps secure network devices

Read the original article: Microsoft Defender ATP now helps secure network devices Microsoft Defender Advanced Threat Protection (ATP) can now assess the collective security configuration state of devices on an enterprise network with the help of a new feature dubbed Microsoft…

Researchers link APT15 hackers to Chinese military company

Read the original article: Researchers link APT15 hackers to Chinese military company Researchers have linked the APT15 hacking group known for Android spyware apps to a Chinese military company, Xi’an Tian He Defense Technology Co. Ltd. […]   Advertise on…

Hundreds arrested after encrypted messaging network takeover

Read the original article: Hundreds arrested after encrypted messaging network takeover European law enforcement agencies arrested hundreds of suspects in several countries including France, Netherlands, the UK, Norway, and Sweden after infiltrating the EncroChat encrypted mobile communication network used by organized crime groups. […]…

Hundreds arrested after encrypted phone network takeover

Read the original article: Hundreds arrested after encrypted phone network takeover European law enforcement agencies arrested hundreds of suspects in several countries including France, Netherlands, the UK, Norway, and Sweden after infiltrating the EncroChat encrypted mobile communication network used by organized crime groups. […]…

Federal Reserve shares tips on mitigating synthetic identity fraud

Read the original article: Federal Reserve shares tips on mitigating synthetic identity fraud The U.S. Federal Reserve today issued guidance on how financial organizations from the United States can mitigate payment fraud attempts scammers carry out with the help of synthetic identity accounts. …

US Govt shares tips on defending against cyberattacks via Tor

Read the original article: US Govt shares tips on defending against cyberattacks via Tor The Cybersecurity and Infrastructure Security Agency (CISA) today issued guidance on how to protect against cyberattacks launched from the activity originating from or routed through the Tor…