Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 21 to 30
DJ Marshmello Concert On Fortnite: An Iconic Event That Also Attracted Scammers
1st Mar 2019 [21 days ago] from ESET Research
The first virtual concert to take place inside a video game attracted interest not only from players but also from scammers, who tried to take advantage of the huge event by tricking users into buying tickets even though the concert was...
ICAO Victim Of A Major Cyberattack In 2016
1st Mar 2019 [21 days ago] from ESET Research
The organization was the victim of a water-hole attack, likely attributable to the APT LuckyMouse group The post ICAO victim of a major cyberattack in 2016 appeared first on WeLiveSecurity
Shifting Strategies: Using Social Media, SEO In Tech Support Scams
28th Feb 2019 [22 days ago] from TrendMicro
Tech support scams have diversified into new territory. They now use pop-up alerts and social engineering tactics to spread fake toll-free numbers and links of their fake tech support websites on popular social media platforms. The post...
FLARE Script Series: Recovering Stackstrings Using Emulation With Ironstrings
28th Feb 2019 [22 days ago] from FireEye Research
This blog post continues our Script Series where the FireEye LabsAdvanced Reverse Engineering (FLARE) team shares tools to aid themalware analysis community. Today, we release ironstrings: a new IDAPython script to recoverstackstrings...
Booter Boss Interviewed In 2014 Pleads Guilty
28th Feb 2019 [22 days ago] from Krebsonsecurity
A 20-year-old Illinois man has pleaded guilty to running multiple DDoS-for-hire services that launched millions of attacks over several years. The plea deal comes almost exactly five years after KrebsOnSecurity interviewed both the admitted...
Coinhive Cryptocurrency Miner To Call It A Day Next Week
28th Feb 2019 [22 days ago] from ESET Research
The service became notorious for its use by ne’er-do-wells looking to make a quick buck by hijacking the processing power of victim machines to generate virtual money The post Coinhive cryptocurrency miner to call it a day next week appeared...
How A Hacking Group Is Stealing Popular Instagram Profiles
28th Feb 2019 [22 days ago] from TrendMicro
Social media influencers build and expand their business or brand through credibility and authenticity to their audience. For hackers, however, they could be seen as trophies. That’s what happened to a photographer with more than 15,000...
Crypto Mining Service Coinhive To Call It Quits
27th Feb 2019 [23 days ago] from Krebsonsecurity
Roughly one year ago, KrebsOnSecurity published a lengthy investigation into the individuals behind Coinhive[.]com, a cryptocurrency mining service that has been heavily abused to force hacked Web sites to mine virtual currency. On Tuesday,...
What’s Hiding In Encrypted Traffic? Millions Of Advanced Threats.
27th Feb 2019 [23 days ago] from Zscaler
Once seen as the ultimate protection for data being transmitted over the internet, encryption has become a vast playground for cybercriminals. Zscaler ThreatLabZ, the research organization at Zscaler, analyzed the encrypted traffic traversing...
‘Highly Critical’ Bug Exposes Unpatched Drupal Sites To Attacks
27th Feb 2019 [23 days ago] from ESET Research
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads The post ‘Highly critical’ bug exposes unpatched Drupal sites to attacks appeared first on WeLiveSecurity
« Newer 1 2 3 4 5 6 7 8 9 10 Older »