Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 11 to 20
Scammers Use Cheap And Squatted Domains To Create Fake Sites
6th Mar 2019 [16 days ago] from Zscaler
Last summer, a ThreatLabZ blog covered scam campaigns in which bad actors using .tk domains were showing warnings of a fake malware infection and trying to generate revenue by offering remediations. We recently noticed the development...
UPnP-enabled Connected Devices In The Home And Unpatched Known Vulnerabilities
6th Mar 2019 [16 days ago] from TrendMicro
Many devices such as cameras, printers, and routers use UPnP to make it easy for them to automatically discover and vet other devices on a local network and communicate with each other for data sharing or media streaming. UPnP works with...
RSA – IoT Security Meets SMB
6th Mar 2019 [16 days ago] from ESET Research
Some tips that businesses can do to get better at it without breaking the bank The post RSA – IoT security meets SMB appeared first on WeLiveSecurity
Payment Processors Remain Phishers’ Favorites
5th Mar 2019 [17 days ago] from ESET Research
The latest report from the Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018 The post Payment processors remain phishers’ favorites appeared first on WeLiveSecurity
Exposed IoT Automation Servers And Cybercrime
5th Mar 2019 [17 days ago] from TrendMicro
In our latest research we tested possible threat scenarios against complex IoT environments such as in smart homes and smart buildings. A significant part of the research also involved a look into exposed automation platforms or servers,...
Fileless Banking Trojan Targeting Brazilian Banks Downloads Possible Botnet Capability, Info Stealers
5th Mar 2019 [17 days ago] from TrendMicro
We analyzed a fileless banking trojan targeting three major banks in Brazil and their customers, downloading info stealers, keyloggers and a hack tool. Infected machines can be used for a botnet and mass mailed targeted attacks, and our...
Hackers Sell Access To Bait-and-Switch Empire
4th Mar 2019 [18 days ago] from Krebsonsecurity
Cybercriminals are auctioning off access to customer information stolen from an online data broker behind a dizzying array of bait-and-switch Web sites that sell access to a vast range of data on U.S. consumers, including DMV and arrest...
Teen Earns US$1 Million In Bug Bounties
4th Mar 2019 [18 days ago] from ESET Research
A ‘white hat’ from Argentina has come a long way since winning his first reward of US$50 in 2016 The post Teen earns US$1 million in bug bounties appeared first on WeLiveSecurity
APT40: Examining A China-Nexus Espionage Actor
4th Mar 2019 [18 days ago] from FireEye Research
FireEye is highlighting a cyber espionage operation targeting crucialtechnologies and traditional intelligence targets from a China-nexusstate sponsored actor we call APT40. The actor has conductedoperations since at least 2013 in support...
Exposed Docker Control API And Community Image Abused To Deliver Cryptocurrency-Mining Malware
1st Mar 2019 [21 days ago] from TrendMicro
Through data analysis of the container honeypots we’ve set up to monitor threats, we’ve uncovered notable activities of undesired or unauthorized cryptocurrency miners being deployed as rogue containers using a community-contributed...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »