Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 11 to 20
New Magecart Attack Delivered Through Compromised Advertising Supply Chain
16th Jan 2019 [5 days ago] from TrendMicro
On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time, we found their malicious skimming code (detected by Trend Micro as JS_OBFUS.C.) loaded on 277 e-commerce...
“Stole $24 Million But Still Can’t Keep A Friend”
15th Jan 2019 [6 days ago] from Krebsonsecurity
Unsettling new claims have emerged about Nicholas Truglia, a 21-year-old Manhattan resident accused of hijacking cell phone accounts to steal tens of millions of dollars in cryptocurrencies from victims. The lurid details, made public in...
Microsoft Gains Strong Customer And Analyst Momentum In The Cloud Access Security Brokers (CASB) Market
15th Jan 2019 [6 days ago] from Microsoft
Microsoft jumped to the Challenger position in the Gartners 2018 Magic Quadrant for CASB and solidified its Leadership position in KuppingerColes 2018 Leadership Compass in the same product category. The post Microsoft gains strong customer...
What Makes A Cybercriminal?
15th Jan 2019 [6 days ago] from ESET Research
Forget balaclavas or hoodies, these cybercriminals are hiding in plain sight The post What makes a cybercriminal? appeared first on WeLiveSecurity
Demonstrating Command Injection And E-Stop Abuse Against Industrial Radio Remote Controllers
15th Jan 2019 [6 days ago] from TrendMicro
In our research, we found that it is possible to perform attacks within or out of RF range. For remote attackers out of the transmission range, there are two possibilities: be a truly remote attacker and do a computer-borne attack (that...
Courts Hand Down Hard Jail Time For DDoS
14th Jan 2019 [7 days ago] from Krebsonsecurity
Seldom do people responsible for launching crippling cyberattacks face justice, but increasingly courts around the world are making examples of the few who do get busted for such crimes. On Friday, a 34-year-old Connecticut man received...
CES: Smart Cities And The Challenge Of Securing The Neighborhood
14th Jan 2019 [7 days ago] from ESET Research
In our final report from CES we take a look at smart city initiatives The post CES: Smart cities and the challenge of securing the neighborhood appeared first on WeLiveSecurity
A Nasty Trick: From Credential Theft Malware To Business Disruption
10th Jan 2019 [11 days ago] from FireEye Research
FireEye is tracking a set of financially-motivated activity referredto as TEMP.MixMaster that involves the interactive deployment of Ryukransomware following TrickBot malware infections. These operationshave been active since at least December...
Mjag Dropper: Using Decoy Documents To Drop RATs
10th Jan 2019 [11 days ago] from Zscaler
Mjag dropper Mjag dropper is compiled in the Microsoft .NET framework, and its original binary is obfuscated using SmartAssembly. The installation path and other details are stored in encrypted form using AES encryption (Fig. 1), and...
Best Practices For Securely Using Microsoft 365—the CIS Microsoft 365 Foundations Benchmark Now Available
10th Jan 2019 [11 days ago] from Microsoft
The Center for Internet Securitys (CIS) Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365. The post Best practices for securely using Microsoft 365—the...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »