Remove 2019 Remove Cryptocurrency Remove Information Security Remove Spyware
article thumbnail

Security Affairs newsletter Round 240

Security Affairs

Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild. CVE-2019-3648 flaw in all McAfee AV allows DLL Hijacking. Two men arrested for stealing $550,000 in cryptocurrency with Sim Swapping. WhatsApp flaw CVE-2019-11931 could be exploited to install spyware.

DDOS 51
article thumbnail

Security Affairs newsletter Round 222 – News of the week

Security Affairs

Adobe Patch Tuesday updates for July 2019 address only 5 minor flaws. Microsoft released Patch Tuesday security updates for July 2019. New FinFisher spyware used to spy on iOS and Android users in 20 countries. CVE-2019-1132 Windows Zero-Day exploited by Buhtrap Group in government attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Roundup for May 2021

Security Boulevard

roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, April 2021. The UK Security Service MI5 said 10,000 staff from every UK government department and from important UK industries have been lured by fake LinkedIn profiles.

article thumbnail

New Android BlackRock malware targets hundreds of apps

Security Affairs

The source code of the Xerxes malware was leaked online around May 2019. The list of targeted apps includes cryptocurrency wallet applications (i.e. The BlackRock malware borrows the code from the Xerxes banking malware, which is a strain of the popular LokiBot Android trojan. Coinbase, BitPay, and Coinbase), and banks (i.e.

Malware 88
article thumbnail

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Security Affairs

Recently, researchers warned of the first mass-hacking campaign exploiting the BlueKeep exploit , the attack aimed at installing a cryptocurrency miner on the infected systems. pic.twitter.com/VdiKoqAwkr — Kevin Beaumont (@GossiTheDog) November 2, 2019. huh, the EternalPot RDP honeypots have all started BSOD'ing recently.

article thumbnail

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Security Affairs

Group-IB, a Singapore-based cybersecurity company, observed the growth of the lifespan of phishing attacks in the second half of 2019. H2 2019 has proved the tendency of past several years: mail remains the main method of delivering ransomware, spyware, backdoors and other malware, being used by cyber crooks in 94 percent of cases.

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. From accessing your business-critical resources and sensitive information to halting business operations and services, a malware infection can quickly become an organization’s worst nightmare come true.