| Security Research News |
| Showing 'Security Research News' from 51 to 60|
| |High‑profile Twitter Accounts Hacked To Promote Bitcoin Scam Tech titans and prominent politicians among victims of a sprawling hack that Twitter says leveraged its internal tools
The post High‑profile Twitter accounts hacked to promote Bitcoin scam appeared first on WeLiveSecurity
| |Who’s Behind Wednesday’s Epic Twitter Hack? Twitter was thrown into chaos on Wednesday after accounts for some of the worlds most recognizable public figures, executives and celebrities starting tweeting out links to bitcoin scams. Twitter says the attack happened because someone...
| |Capa: Automatically Identify Malware Capabilities capa is the FLARE team’s newest open-source tool for analyzingmalicious programs. Our tool provides a framework for the community toencode, recognize, and share behaviors that we’ve seen in malware.Regardless of your background, when...
| |Mac Cryptocurrency Trading Application Rebranded, Bundled With Malware ESET researchers lure GMERA malware operators to remotely control their Mac honeypots
The post Mac cryptocurrency trading application rebranded, bundled with malware appeared first on WeLiveSecurity
| |Microsoft Patches Critical, Wormable Flaw In Windows DNS Server The company urges organizations to waste no time in installing updates to fix the vulnerability that rates a ‘perfect’ 10 on the severity scale
The post Microsoft patches critical, wormable flaw in Windows DNS Server appeared first...
| |Details Of 142 Million MGM Hotel Guests Selling For US$2,900 It appears that the July 2019 breach at MGM Resorts affected far more people than initially thought
The post Details of 142 million MGM hotel guests selling for US$2,900 appeared first on WeLiveSecurity
| |Mobile Security Threats Amid COVID‑19 And Beyond: A Q&A with Lukas Stefanko ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
The post Mobile security threats amid COVID‑19 and beyond: AQ&Awith...
| |Financially Motivated Actors Are Expanding Access Into OT: Analysis Of
Kill Lists That Include OT Processes Used With Seven Malware Families Mandiant Threat Intelligence has researched and written extensivelyon the increasing financially motivated threat activity directlyimpacting operational technology (OT) networks. Some of this researchis available in our previous blog posts...
| |Welcome Chat As A Secure Messaging App? Nothing Could Be Further From The Truth ESET research uncovers a malicious operation that both spies on victims and leaks their data
The post Welcome Chat as a secure messaging app? Nothing could be further from the truth appeared first on WeLiveSecurity
| |Patch Tuesday: Fixes For ‘Wormable’ Windows DNS Server RCE, SharePoint Flaws The July update issues 123 patches, including fixes in RemoteFX vGPU, Microsoft Office, Microsoft Windows, OneDrive, and Jet Database Engine. The patches address 18 vulnerabilities rated Critical and 105 that were rated Important in severity.
| « Newer 1 2 3 4 5 6 7 8 9 10 Older » |