HackDig : Dig high-quality web security articles for hackers

Ragnar Locker Ransomware Uses Virtual Machines for Evasion

The Ragnar Locker ransomware has been deploying a full virtual machine to ensure that it can evade detection, Sophos reveals.The cybercriminals behind Ragnar Locker use various exploits or target Remote Desktop Protocol (RDP) connections to compromise networks, and also steal data from targeted networks prior to deploying the ransomware, to entice victims to
Publish At:2020-05-24 07:50 | Read:72 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

Chinese Hackers Target Air-Gapped Military Networks

A threat actor believed to be operating out of China has been targeting physically isolated military networks in Taiwan and the Philippines, Trend Micro reports.Tracked as Tropic Trooper and KeyBoy, and active since at least 2011, the threat actor is known for the targeting of government, military, healthcare, transportation, and high-tech industries in Taiw
Publish At:2020-05-18 13:55 | Read:168 | Comments:0 | Tags:Cyberwarfare Endpoint Security NEWS & INDUSTRY Virus &am

Windows Vulnerabilities Exploited for Code Execution, Privilege Escalation

Microsoft’s Update Tuesday patches for April 2020 address 113 vulnerabilities, including three Windows flaws that have been exploited in attacks for arbitrary code execution and privilege escalation.Microsoft has patched two actively exploited remote code execution vulnerabilities related to the Adobe Type Manager Library. Despite its name, this library is e
Publish At:2020-04-14 15:21 | Read:526 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vu

New Dell Utility Alerts Security Teams of BIOS Attacks

Dell on Friday announced the launch of Dell SafeBIOS Events & Indicators of Attack, a utility designed to alert IT and security teams about BIOS configuration changes that could be part of a sophisticated attack.Dell SafeBIOS Events & Indicators of Attack (IoA) is available immediately worldwide for Dell commercial PCs as part of the company’s Truste
Publish At:2020-04-10 12:13 | Read:507 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY IOS

Sophos Releases Sandboxie in Open Source

Sophos this week announced that the source code of isolation tool Sandboxie is now publicly available.Sandboxie was initially developed by Ronen Tzur, who sold it to Invincea in 2013. The sandbox-based isolation program became part of Sophos’ portfolio in 2017, after the cybersecurity solutions provider acquired Invincea.In September last year, Sophos made S
Publish At:2020-04-10 12:13 | Read:447 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Management & Strat

Avast Launches Security-Focused Browser for Android

Security solutions provider Avast this week announced the launch of an Android version of its Avast Secure Browser.Previously available for Windows and macOS, the browser aims to provide users with increased security and privacy while navigating the Internet, shopping, or accessing their bank accounts on their Android devices.The mobile application builds on
Publish At:2020-04-09 12:17 | Read:452 | Comments:0 | Tags:Endpoint Security Mobile Security NEWS & INDUSTRY Privac

Free Security Tools, Resources Offered During Coronavirus Outbreak

Many companies are offering free cybersecurity tools and resources to help organizations during the COVID-19 coronavirus outbreak.Tens of companies have announced over the past weeks that they are offering free tools and services to organizations impacted by the pandemic. However, some experts have cautioned about these offers.“A word of caution to businesse
Publish At:2020-04-07 18:51 | Read:611 | Comments:0 | Tags:Endpoint Security Mobile Security Network Security NEWS &

FBI Warns of Ongoing Kwampirs Attacks Targeting Global Industries

A malicious campaign is targeting organizations from a broad range of industries with a piece of malware known as Kwampirs, the Federal Bureau of Investigation warns.Initially detailed in 2018, the malware is a custom backdoor associated with a threat actor tracked as Orangeworm, which has been active since at least 2015, mainly targeting organizations in th
Publish At:2020-03-31 14:55 | Read:284 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

FBI: Cybercriminals Mailing Malicious USB Devices to Victims

The financially-motivated hacking group FIN7 has started mailing malicious USB devices to intended victims in an effort to infect their computers with malware, the FBI warns.Active since at least 2015, the cybercrime group has been focused on stealing credit card information from businesses worldwide. The hackers were indicted in the United States for target
Publish At:2020-03-30 12:22 | Read:273 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

Users Complain About Windows Update That Patches SMBGhost Vulnerability

Some users have complained that the Windows security update released recently by Microsoft to patch a wormable vulnerability related to Server Message Block 3.0 (SMBv3) is causing problems.Microsoft released an out-of-band update for Windows 10 and Windows Server on March 12 to fix CVE-2020-0796, a vulnerability that can allow an unauthenticated attacker to
Publish At:2020-03-17 09:31 | Read:366 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Vulnerabilities Vulner

Microsoft Deprecates Remote Desktop Connection Manager

Microsoft announced this week that has deprecated Remote Desktop Connection Manager (RDCMan) due to security concerns. The application has been around for decades, providing users with the ability to manage multiple remote desktop connections, but Microsoft has long been investing in other solutions to provide users with remote desktop access. In a
Publish At:2020-03-13 13:45 | Read:295 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY

Google Releases Tool to Block USB Keystroke Injection Attacks

Google has released a new software tool designed to identify potential USB keystroke injection attacks and block devices they originate from. With keystroke injection tools being easily availabile, they are able to send keystrokes immensely fast while being effectively invisible to the victim. Delivered over USB, keystroke injection attacks require a Hu
Publish At:2020-03-12 15:42 | Read:395 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Identity & Access

Load Value Injection: Intel CPUs Vulnerable to Reverse Meltdown Attack

Many processors made by Intel are vulnerable to a newly disclosed type of attack named Load Value Injection (LVI), but the chip maker has told customers that the attack is not very practical in real world environments.The vulnerability, tracked as CVE-2020-0551, was first reported to Intel in April 2019 by Jo Van Bulck from the KU Leuven research university
Publish At:2020-03-10 16:30 | Read:318 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Cloud Security Vulnera

Checkpoint Creates Encyclopedia of Malware Evasion Techniques

Cybersecurity firm Checkpoint has created an encyclopedia of the various techniques used by malware to evade analysis.The encyclopedia covers evasion techniques related to the file system, registry, generic OS queries, global OS objects, user interface artifacts, OS features, processes, network, CPU, firmware tables, hooks, hardware, and macOS-specific sandb
Publish At:2020-03-02 18:49 | Read:327 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

Microsoft Boosts PUA Protections in Edge

Microsoft this week announced new features in its Edge browser to prevent the download of potentially unwanted applications (PUA).PUAs may refer to applications that create extra advertisements, mine for crypto-currencies, or display offers for other pieces of software that have a poor reputation. Such software can hurt user experience, lower productivity an
Publish At:2020-02-28 14:56 | Read:556 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi


Share high-quality web security related articles with you:)


Tag Cloud