Remove weekly-update-173
article thumbnail

Weekly Update 173

Troy Hunt

Instead, this week's update is focused primarily on a completely different epic fail, namely Surebet247's handling of a breach impacting their customers. Had I done that, you'd have caught me toppling backwards into the frangipani tree whilst trying to position my chair and camera which frankly, would have made for entertaining viewing.

Passwords 139
article thumbnail

Do cyber regulations actually make K–12 schools safer? Navigating compliance while securing school and student data

Malwarebytes

Recovery expenditures include staff time, device and network costs, ransom, and downtime, which to K­–12 districts represents the costliest expense, as students aren’t learning when systems are down and schools are closed. Install, regularly update, and enable real-time detection for antivirus software.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake system update drops Aurora stealer via Invalid Printer loader

Malwarebytes

A threat actor is using malicious ads to redirect users to what looks like a Windows security update. The fake security update is using a newly identified loader that at the time of the campaign was oblivious to malware sandboxes and bypassed practically all antivirus engines. The file would simply run and exit quickly.

article thumbnail

The Evolution of Aggah: From Roma225 to the RG Campaign

Security Affairs

Since December 2018, we are following the tracks of this ambiguous cyber criminal group, internally referenced as TH-173. Few weeks ago, Unit42 discovered another active campaign , compatible with the Roma225 one we tracked on December 2018, pointing to some interesting changes into the attackers TTPs. Figure 12: Hagga campaign reference.

Malware 63