Peeking into .msg files, (Sun, Oct 15th)

Readers often submit malware samples, and sometimes the complete email with attachment. For example exported from Outlook, as a .msg file. Did you know that .msg files use the Compound…

Cyberespionage Group Steps Up Campaigns Against Japanese Firms

Researchers unearth new tactics and strategies used by the criminals behind the hacking group known as Bronze Butler. Source: threatpost.com/ Cyberespionage Group Steps Up Campaigns Against Japanese Firms

Kotlin Expected to Surpass Java as Android Default Programming Language for Apps

A new report released earlier this week estimates that Kotlin will surpass Java as the primary programming language used for Android apps by December 2018. […] Source: leepingcomputer.com Kotlin…

To Nobody's Surprise, Ships Are Just as Easy to Hack as Anything Else

Modern-day ships aren’t that hard to hack according to Ken Munro, a security researcher at Pen Test Partners, a UK cyber-security company. Speaking at a conference in Athens, Greece, Munro…

The Week in Ransomware – October 13th 2017 – DoubleLocker, Locky, and More

Like usual, this week has been dominated mostly by small variants that most likely will never make it into distribute. We did, though, see a new CryptoMix and Locky variant…

New Anubi Ransomware In the Wild

A new ransomware called Anubi was discovered by Malwarebytes security researcher S!Ri that appends the .[anubi@cock.li].anubi extension to encrypted files. While not much is known about how this ransomware is…

A Conversation With the Cyber Gang 'The Dark Overlord'

A discussion with ISMG Security and Technology Editor Jeremy Kirk about his chat with the cyber gang “The Dark Overlord,” which threatened some U.S. school districts with extortion, leads the…

Contest Aims to Improve Health Data Exchange Security

In Search of a Security Component for the New FHIR StandardThe new FHIR standard is designed to help ease the exchange of health data among healthcare organizations across the nation….

Equifax, TransUnion Websites Served Up Adware, Malware

A Carousel of Badness: Fake Surveys, Fake Flash Players and Exploit KitsSecurity researchers have discovered websites run by credit bureaus Equifax and TransUnion were both affected by dodgy code that…

Hyatt Hotels Suffers International Payment Card Data Breach

15-Week Malware Attack Stole Card Data From 41 Hotels Across 11 CountriesFor the second time in two years, Hyatt Hotels suffered a payment card data breach after attackers infected payment…

Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130

Hackers gained “full and unfettered access” to a third-party holding restricted information Source: Naked Security Sophos Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130

IT Admin Trashes Railroad Company's Network Before He Leaves

A federal jury in Minneapolis, Minnesota found a local man guilty of intentionally damaging his former employer’s network before leaving the company. […] Source: leepingcomputer.com IT Admin Trashes Railroad…

Siemens Patches Flaws in Building Automation Controllers

Siemens has released a firmware update for its BACnet Field Panel building automation products to address two vulnerabilities, including one classified as high severity. read more Source: Security…

Hyatt Hit By Credit Card Breach, Again

Hyatt said its payment systems have been breached, exposing credit card data from 41 hotels in 11 countries between March and July this year. Source: threatpost.com/ Hyatt Hit By…

Google Busy Removing More Malicious Chrome Extensions from Web Store

Three malicious Chrome extensions spoofing AdBlock Plus were removed from the Chrome Web Store this week. Source: threatpost.com/ Google Busy Removing More Malicious Chrome Extensions from Web Store

Next Page