Posts

Top stories

CISA warns of Windows and UnRAR flaws exploited in the wild The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two more flaws to its catalog of Known Exploited Vulnerabilities, based on evidence of active exploitation. [...] via BleepingComputer (author: Ionut Ilascu)

Top stories

How hackers are stealing credit cards from classifieds sites A new credit card stealing campaign is underway in Singapore, snatching the payment details of sellers on classifieds sites through an elaborate phishing trick. [...] via BleepingComputer (author: Bill Toulas)

Top stories

Microsoft: Exchange ‘Extended Protection’ needed to fully patch new bugs Microsoft says that some of the Exchange Server flaws addressed as part of the August 2022 Patch Tuesday also require admins to manually enable Extended Protection on affected servers to fully block attacks. [...] via BleepingComputer (author: Sergiu Gatlan)

Top stories

U.S. Sanctions Virtual Currency Mixer Tornado Cash for Alleged Use in Laundering The U.S. Treasury Department on Monday placed sanctions against crypto mixing service Tornado Cash, citing its use by the North Korea-backed Lazarus Group in the high-profile hacks of Ethereum bridges to launder and cash out the ill-gotten money. Tornado Cash, which allows users to move cryptocurrency assets between accounts by obfuscating their origin and destination, is estimated to have been via The Hacker News (author: noreply@blogger.com (Ravie Lakshmanan))

Top stories

10 Credential Stealing Python Libraries Found on PyPI Repository In what's yet another instance of malicious packages creeping into public code repositories, 10 modules have been removed from the Python Package Index (PyPI) for their ability to harvest critical data points such as passwords and Api tokens. The packages "install info-stealers that enable attackers to steal developer's private data and personal credentials," Israeli cybersecurity firm Check via The Hacker News (author: noreply@blogger.com (Ravie Lakshmanan))

Top stories

Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions Over a dozen military-industrial complex enterprises and public institutions in Afghanistan and Europe have come under a wave of targeted attacks since January 2022 to steal confidential data by simultaneously making use of six different backdoors. Russian cybersecurity firm Kaspersky attributed the attacks "with a high degree of confidence" to a China-linked threat actor tracked by Proofpoint via The Hacker News (author: noreply@blogger.com (Ravie Lakshmanan))

Top stories

KMSpico explained: No, KMS is not "kill Microsoft" via Malwarebytes Labs

Top stories

A week in security (August 1 - August 7) Last week on Malwarebytes Labs: ● Have we lost the fight for data privacy? Lock and Code S03E16 ● Wrestling star Mick Foley’s Twitter compromised, selling PS5 consoles ● Millions of Arris routers are vulnerable to path traversal attacks ● When a sextortion victim fights back ● How to protect yourself and your kids against device theft ● For months, JusTalk messages were accessible to everyone on the Internet ● Update now! VMWare patches critical vulnerabilities in several products ● NetStandard attack should make Managed Service Providers sit up and take notice ● Bank fraud scammers trick victims with claims of bogus Zelle transfers ● Woody RAT: A new feature-rich malware spotted in the wild ● Ransomware protection with Malwarebytes EDR: Your FAQs, answered! ● Ransomware review: July 2022 ● FCC warns of steep rise in phishing over SMS ● Phishy calls and emails play on energy cost increase fears ● Patch now! Cisco...

Top stories

deBridge Finance crypto platform targeted by Lazarus hackers Hackers suspected to be from the North Korean Lazarus group tried their luck at stealing cryptocurrency from deBridge Finance, a cross-chain protocol that enables the decentralized transfer of assets between various blockchains. [...] via BleepingComputer (author: Ionut Ilascu)

Top stories

How to find out if you are involved in a data breach -- and what to do next Here's a guide highlighting the tools you can use to determine if your account is at risk. via Latest stories for ZDNet in Security