Iranian hackers planting backdoors in companies around the world

ClearSky research team has uncovered a widespread Iranian offensive campaign which we call “Fox Kitten Campaign”; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world. Though the campaign, the attackers succeeded in gaining access and persistent foothold in the networks of numerous companies and organizations from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world. …

ClearSkySec.com click the link to read the rest of the story.  Get our free tools here.

How does your firm monitor such breaches?Join the conversation on our Facebook Page!

Watch Out: This Verizon Smishing Scam Is Crazy Realistic

Text message scams are becoming more common, and the latest scam we’ve seen is the most sophisticated yet. The scammer impersonates Verizon, sending you an “account security” text message that takes you to a shockingly convincing copy of Verizon’s website.  We opened the link to see the scam in action. Don’t try this at home: If you receive a scam message, we recommend against opening any links attached to it. You should also delete the message and block the sender. …

HowToGeek.com click the link to read the rest of the story.  Get our free tools here.

Have you seen any text message scams?Join the conversation on our Facebook Page!

Minimize Risk While Surfing the Web on Your Phone

We simply enjoy surfing on wireless networks wherever we go… assume that none of these networks are safe. This is especially important for those of us who use our mobile devices for online banking, accessing medical records, storing our passwords with a password manager, or browsing files on Dropbox, Google Drive, or Windows OneDrive. … Here are a few tools that can help protect your most precious data from those with powerful digital tools and prying eyes.

Medium.com click the link to read the rest of the story.  Get our free tools here.

What precautions do you use when accessing using public wifi?Join the conversation on our Facebook Page!

This crafty malware makes you retype your passwords so it can steal them

A trojan malware campaign is targeting online banking users around the world with the aim of stealing credit card information, finances and other personal details. … Like many other hacking campaigns, Metamorfo begins with phishing emails that in this case claim to contain information about an invoice and invite the user to download a .ZIP file….

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen this yet?Join the conversation on our Facebook Page!

New service notifies companies when their employees get phished

Companies across the world now have a new free web service at their disposal that will automatically send out email notifications if one of their employees gets phished.  The service is named “I Got Phished” and is managed by Abuse.ch, a non-profit organization known for its malware and cyber-crime tracking operations.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Will you sign up?Join the conversation on our Facebook Page!

Microsoft Issues Excel Security Alert

A well-known hacking group called TA505 is weaponizing Microsoft Excel to spread a malware payload. Researchers from Microsoft Security Intelligence have this week taken to Twitter to warn users to be alert to the ongoing campaign.

Forbes.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your business from these attacks?Join the conversation on our Facebook Page!

Patch the top ten software flaws used by crooks

The most commonly exploited vulnerabilities – and the technology they target … patch these now!  Adobe Flash Player, Microsoft Internet Explorer, Microsoft Office, Adobe Flash Player, Microsoft WinRAR

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you patch your apps?Join the conversation on our Facebook Page!

This simple malware still plagues one in 10 Mac users

A prolific trojan campaign that tries to trick macOS users into downloading malicious software remains the most common malware Mac users are likely to encounter.  The Shlayer malware first emerged in early 2018 and is predominantly used to install malicious adware on users’ systems, with the intention of generating revenue from pop-up adverts and links that relentlessly appear in the victim’s browser.  Now, two years on from Shlayer’s arrival, figures from Kaspersky Lab reveal that the malware has targeted over one in ten macOS users, making it the most widespread macOS malware threat.

ZDNet.com click the link to read the rest of the story. Get our free tools here.

How do you protect your Mac devices?Join the conversation on our Facebook Page!

515,000+ hacked passwords+ for servers, routers, and IoT devices now online

The list, which was published on a popular hacking forum, includes each device’s IP address, along with a username and password for the Telnet service, a remote access protocol that can be used to control devices over the internet.  …

ZDNet.com click the link to read the rest of the story. Get our free tools here.

You may be contacted about your server by legit security people. But make changes with people you know and trust!Join the conversation on our Facebook Page!

Iranian Hackers new attacks to breach the US Grid

Given the the threat of Iranian counterattacks, infrastructure owners should be aware of [these new campaigns] and they should consider not just new attempts to breach their networks but also the possibility that those systems have already been compromised. “My concern with the Iran situation is not that we’re going to see some new big operation spin up,” Lee says. “My concern is with access that groups might already have.” …

Wired.com click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing for this?

Join the conversation on our Facebook Page!

Hackers Demand Ransom From Medical Patients After Breach

In a troubling new ransomware twist, hackers are demanding patients of Florida provider Richard Davis, MD pay a ransom to prevent the release of their personal information following a breach of the clinic’s server. … Patients are urged to share the notification with any known patients of The Center…

ampproject.org click the link to read the rest of the story. Our FREE Tools can help!

If hackers did this to your business, could you survive it?

Join the conversation on our Facebook Page!

Homeland Security Alert: All Users to update Firefox browsers Immediately

If you use Mozilla Firefox’s web browser, you’ll want to drop what you are doing right now and update it. Now.  Failure to do so, could allow an attacker to take control of a user’s entire operating system—whether they use Windows or Mac. More alarming, the vulnerability is already being exploited…

FastCompany.com click the link to read the rest of the story. Our FREE Tools can help!

Send this to your friends!Join the conversation on our Facebook Page!

Chinese hackers get around two-factor authentication

Security researchers say they found evidence that a Chinese government-linked hacking group has been bypassing two-factor authentication (2FA) in a recent wave of attacks.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How would you deal with threats like this?

Join the conversation on our Facebook Page!

ALERT! TP-Link routers allow anyone to change your WiFi password

According to researchers in ethical hacking, if exploited, this vulnerability would allow a remote threat actor to take control of device settings via Telnet to connect to a File Transfer Protocol server (FTP) over LAN or WAN.  Exploiting this vulnerability would give the attacker administrator privileges…

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you own one of these?Join the conversation on our Facebook Page!

Windows Hack Attackers! Microsoft Responds With Powerful Counterpunch

It has been confirmed that the Microsoft Digital Crimes Unit (DCU) has been tracking a hacking campaign against Windows users. … The threat group behind these cyber-attacks is thought to be based in North Korea and has been named as “Thallium” by Microsoft and is also known as APT37. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What else should be done to stop these hackers?Join the conversation on our Facebook Page!

Cyber security 101: Protect your privacy from hackers, spies, and the government

Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How do you protect your online security & privacy?

Join the conversation on our Facebook Page!

New Orleans city computers offline after cyberattack

The NOLA.gov website was still down for “unplanned maintenance” Sunday, but emergency services such as 911 and the fire department are still operational, the New Orleans’ Office of Homeland Security & Emergency Preparedness said. The FBI and Secret Service are assisting with the investigation, the city said. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business survive attacks like this?Join the conversation on our Facebook Page!

 

New Ransomware overcomes PC security by rebooting into Safe Mode

SophosLabs researchers have been investigating an ongoing series of ransomware attacks in which the ransomware executable forces the Windows machine to reboot into Safe Mode before beginning the encryption process. The attackers may be using this technique to circumvent endpoint protection, which often won’t run in Safe Mode. …

Sophos.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if your computers were encrypted by ransomware?Join the conversation on our Facebook Page!

FBI recommends that you keep your IoT devices on a separate network

The FBI also recommends changing factory-set (default) passwords and not allowing an IoT device’s accompanying mobile app to gain access to too many smartphone permissions. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your network from IOT vulnerabilities?

Join the conversation on our Facebook Page!

New ransomware attacks target your NAS devices, backup storage

The number of ransomware strains targeting NAS and backup storage devices is growing, with users “unprepared” for the threat, researchers say. … Once deployed on a system, the malware will usually encrypt files or full drives, issue its victim with a ransom note, and demand payment in return for a way to decrypt and restore access to locked content. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your backups from ransomware?

Join the conversation on our Facebook Page!

Ransomware devastated cities this year. Officials hope to prevent a repeat in 2020

Security experts expect ransomware attacks against local governments to ramp up in 2020. But government officials hope that if they can properly protect cities and stop paying the hackers, ransomware will eventually die off. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your business?Join the conversation on our Facebook Page!

New trojan is stealing doctors passwords and spreading ransomware

A newly discovered hacking campaign by a ‘sophisticated cyber criminal operation’ is targeting healthcare and education organisations with custom-built…  trojan malware which gives attackers… control of Windows systems with the ability to monitor actions and steal sensitive data. The malicious functions of the remote access trojan , dubbed PyXie RAT, include keylogging, credential harvesting, recording video, cookie theft, the ability to perform man-in-the-middle attacks and the capability to deploy other forms of malware onto infected systems.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What are you doing to keep ahead of these attacks?

Join the conversation on our Facebook Page!

SIM-Swapping Is the Biggest Security Threat You Face and Almost No One Is Trying to Fix It. Here’s Why It Matters.

Imagine you try to log into your bank account one day to setup a payment on your mortgage. You realize that something’s wrong when the bank’s website tells you you’ve entered the wrong password. That’s strange, you think as you click the link to “reset your password.” It’s an easy process, but first, the bank requires that you prove you’re actually you, by sending a simple text message with a six-digit code to the mobile phone number on file. But when you request your code, the text never comes. …

inc.com click the link to read the rest of the story. Our FREE Tools can help!

How do you keep ahead of all of these threats?

Join the conversation on our Facebook Page!

 

 

fake software update downloads malware when you click ‘later’

The hacking campaign has two variations, according to tech security company Zscaler, which has been tracking it. In the first version, the crooks hack into insecure WordPress sites using the theme plugin vulnerability and inject malicious redirect scripts into the compromised site. This allows them to display a fake Flash Player update alert to the user over the compromised site, which aims to trick website visitors into starting a software update. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you determine whether an update is real or not?

Join the conversation on our Facebook Page!

How SMS Works—and Why You Shouldn’t Use It Anymore

Text messages are sent in a multi-step process. While your message might be encrypted from your phone to the first cell tower, it’s not encrypted after that. And your SMSC may keep the message even if both the sender and recipient delete it. ..

popularmechanics. com click the link to read the rest of the story. Our FREE Tools can help!

Do you still use sms?

Join the conversation on our Facebook Page!

Beware of public USB charging stations

Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use public charging stations?

Join the conversation on our Facebook Page!

New ‘unremovable’ xHelper malware has infected 45,000 Android devices

Over the past few months, many users have complained about xHelper’s near “unremovable” state… While the trojan is currently engaging in spam and ad revenue, it also possesses other, more dangerous features. xHelper can download and install other apps, a function that the xHelper could at any point to deploy second-stage malware payloads, such as ransomware, banking trojans, DDoS bots, or password stealers.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you safe using an Android phone?

Join the conversation on our Facebook Page!

New IoT botnet army targeting small office and home routers

Tens of thousands of Wi-Fi routers are potentially vulnerable to an updated form of malware that takes advantage of known vulnerabilities to rope these devices into a botnet for the purposes of selling distributed denial of service (DDoS) attack capabilities to cyber criminals.  A new variant of Gafgyt malware – which first emerged in 2014 – targets small office and home routers from well-known brands

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using one of these routers?

Join the conversation on our Facebook Page!

WAV audio files are now being used to hide malicious code

Two reports published in the last few months show that malware operators are experimenting with using WAV audio files to hide malicious code. …  All previous instances where malware used steganography revolved around using image file formats, such as PNG or JPG.  The novelty in the two recently-published reports is the use of WAV audio files, not seen abused in malware operations until this year. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you keeping up with all the latest threats?

Join the conversation on our Facebook Page!