HackDig : Dig high-quality web security articles for hacker

DDoS Threat Advisory, Compromised cPanel Exploit Kit, Router Pharming Attacks and more | TWIC - February 27, 2015

2015-02-27 18:25
<img alt="TWIC_branding" src="http://info.phishlabs.com/hs-fs/hub/326665/file-1326531266-png/TWIC_branding.png" style="width: 225px;" width="225"> <p><em>Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).</em></p> <ul> <li> <p><a href="http://blog.phishlabs.com/ddos-threat-advisory-%E2%80%93-saas-apps-vulnerable-for-exploitation">DDoS Threat Advisory – SaaS Apps Vulnerable for Exploitation</a> (PhishLabs)<br> Akamai’s Prolexic Security Engineering &amp; Research Team (PLXsert) and PhishLabs’ (R.A.I.D.) Research Analysis and Intelligence Division have worked together on a threat advisory that warns enterprises and Software-as-a-Service (SaaS) providers about new distributed denial of service (DDoS) attacks that leverage Joomla servers that have a vulnerable Google Maps plugin installed.</p> </li> <li> <p><a href="http://www.pcworld.com/article/2890096/uh-oh-eff-researchers-discover-signs-of-superfish-style-attacks-in-the-wild.html">Uh-oh: EFF researchers discover signs of Superfish-style attacks in the wild</a> (PC World)<br>Researchers at the Electronic Frontier Foundation (EFF) yesterday said that they had found evidence that implies attackers have exploited a security vulnerability in the Superfish adware and a slew of other programs.</p> </li> <li> <p><a href="http://www.net-security.org/malware_news.php?id=2972">Compromised cPanel "Account Suspended" pages redirect to exploit kit </a>(HelpNetSecurity)<br> A recently discovered malware delivery campaign has been using an “account suspended” page to exploit vulnerabilities in the visitors' computers and deliver malware to them.</p> </li> <li> <p><a href="http://www.computerworld.com/article/2889841/hackers-exploit-router-flaws-in-unusual-pharming-attack.html">Hackers exploit router flaws in unusual pharming attack</a> (Computer World)<br>An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim's Web traffic.</p> </li> <li> <p><a href="http://www.bankinfosecurity.com/fcc-adopts-net-neutrality-rule-a-7956">FCC Adopts 'Net Neutrality' Rule</a> (BankInfoSecurity)<br>The Federal Communications Commission has voted to treat high-speed broadband and mobile Internet service providers as public utilities, similar to the way telecommunications companies are regulated.</p> </li> <li> <p><a href="http://thehackernews.com/2015/02/lenovo-hacked.html">Lenovo Website Has Been Hacked</a> (The Hacker News)<br>Lenovo.com, the official website of world's largest PC maker has been hacked.</p> </li> <li> <p><a href="http://www.theregister.co.uk/2015/02/27/iran_behind_us_casino_hack/">Iran hacks America where it hurts: Las Vegas casinos</a> (TheRegister)<br>US director of National Intelligence James Clapper has accused Iran of orchestrating a 2014 hack of the Las Vegas Sands casino. The attack crippled the magnificent cultural institution's IT infrastructure.</p> </li> <li> <p><a href="http://krebsonsecurity.com/2015/02/fbi-3m-bounty-for-zeus-trojan-author/?utm_campaign=TWIC&amp;utm_content=12390673&amp;utm_medium=social&amp;utm_source=twitter">FBI: $3M Bounty for ZeuS Trojan Author</a> (KrebsOnSecurity)<br>The FBI this week announced it is offering a USD $3 million bounty for information leading to the arrest and/or conviction of one Evgeniy Mikhailovich Bogachev, a Russian man the government believes is responsible for building and distributing the ZeuS banking Trojan.</p> </li> <li> <p><a href="http://www.csoonline.com/article/2879028/social-engineering/the-worst-of-the-worst-phishing-scams.html#slide1">The worst of the worst phishing scams</a> (CSO)<br>The depths a phishing scammer will stoop to in order to gain a buck are remarkable. Here are some of the bottom feeders to guard against in your inbox.</p> </li> </ul> <img src="http://track.hubspot.com/__ptq.gif?a=326665&amp;k=14&amp;r=http%3A%2F%2Fblog.phishlabs.com%2Fthe-week-in-cybercrime-february-27-2015&amp;bu=http%253A%252F%252Fblog.phishlabs.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important">

Source: 5102-72-yraurbef-emircrebyc-ni-keew-eht/moc.sbalhsihp.golb

Read:1856 | Comments:0 | Tags:Phishing Malware Exploit Trojan The Week in Cybercrime Hacke

“DDoS Threat Advisory, Compromised cPanel Exploit Kit, Router Pharming Attacks and more | TWIC - February 27, 2015”0 Comments

Submit A Comment



Blog :

Verification Code:


Share high-quality web security related articles with you:)


Tag Cloud