Sat.Jan 08, 2022

article thumbnail

500M Avira Antivirus Users Introduced to Cryptomining

Krebs on Security

Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn’t alone in this dubious endeavor: Avira antivirus — which has built a base of 500 million users worldwide largely by making the product free — was recently bought by the same company that owns Norton 360 and is introducing its customers to a service called Avira Crypto.

Antivirus 346
article thumbnail

Weekly Update 277

Troy Hunt

Well that all changed very quickly. One week ago, I was like "I'm going to do this video from somewhere really epic next week" A few hours after that video, the host of the drinks we'd gone to over the road the day before told us she had symptoms. Another few hours later and she's COVID positive. A few days after that and Charlotte is positive too.

262
262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trojanized dnSpy app drops malware cocktail on researchers, devs

Bleeping Computer

Hackers targeted cybersecurity researchers and developers this week in a sophisticated malware campaign distributing a malicious version of the dnSpy.NET application to install cryptocurrency stealers, remote access trojans, and miners. [.].

Malware 145
article thumbnail

Unauthenticated RCE in H2 Database Console is similar to Log4Shell

Security Affairs

Researchers disclosed a critical RCE flaw in the H2 open-source Java SQL database which is similar to the Log4J vulnerability. Jfrog researchers discovered a critical vulnerability in the H2 open-source Java SQL database related to the Log4Shell Log4J vulnerability. The flaw, tracked as CVE-2021-42392 , could allow attackers to execute remote code on vulnerable systems, the good news is that unlike the Log4J issue it should not be as widespread.

IoT 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

WordPress 5.8.3 Security Release

Security Boulevard

On January 6th, Automattic released an important security update for the WordPress core which addresses four separate vulnerabilities. WordPress website administrators are advised to update their websites immediately. All WordPress versions between 3.7 and 5.8 are affected by this, and the security issues include SQL injection, stored XSS and object injection, which we will review in this post.

Firewall 139
article thumbnail

Rapid window title changes cause ‘white screen of death’

Bleeping Computer

Experimentation with ANSI escape characters on terminal emulators has led to the discovery of multiple high-severity DoS (denial of service) vulnerabilities on Windows terminals and Chrome-based web browsers. [.].

124
124

More Trending

article thumbnail

5 Ways To Improve The Security Of Your Magento eCommerce Store

SecureBlitz

This post reveals 5 ways to improve the security of your Magento eCommerce store. An alarming report shows that more than 90% of small online enterprises are prone to data breaches. Because of this, building security authentication for eCommerce should never be a one-time effort once your eCommerce site is up and running. Your site. The post 5 Ways To Improve The Security Of Your Magento eCommerce Store appeared first on SecureBlitz Cybersecurity.

eCommerce 122
article thumbnail

Everything about XDR is around Correlations, not Hype

CyberSecurity Insiders

In the last several months the XDR acronym is being used by almost every security product manufacturer. It is one thing to say that you have it, but the hard work that goes into building the detections takes years. It is not enough to say that you have a big data platform that you can dump things into and search; you need actionable detections that lead to meaningful correlations.

Big data 110
article thumbnail

Facebook Launches 'Privacy Center' to Educate Users on Data Collection and Privacy Options

The Hacker News

Meta Platforms, the company formerly known as Facebook, on Friday announced the launch of a centralized Privacy Center that aims to "educate people" about its approach with regards to how it collects and processes personal information across its family of social media apps.

article thumbnail

FluBot malware continues to evolve. What’s new in Version 5.0 and beyond?

Security Affairs

Researchers warn of new campaigns distributing a new improved version of the FluBot malware posing as Flash Player. Researchers from F5 security are warning of a new enhanced version of the FluBot Android malware that that spread posed as Flash Player. A recent SMISHING campaign spotted by CSIRT KNF , FluBot targeted Polish users with a messaging asking them if to click on a link to view a video.

Malware 107
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

NHS Warns of Hackers Targeting Log4j Flaws in VMware Horizon

The Hacker News

The digital security team at the U.K. National Health Service (NHS) has raised the alarm on active exploitation of Log4Shell vulnerabilities in unpatched VMware Horizon servers by an unknown threat actor to drop malicious web shells and establish persistence on affected networks for follow-on attacks.

104
104
article thumbnail

Norton Put a Cryptominer in Its Antivirus Software

WIRED Threat Level

Plus: NFT thefts, a ransomware wave in schools, and more of the week’s top security news.

Antivirus 145
article thumbnail

Alfer Microsoft, also SonicWall confirmed that its products were affected by Y2K22 bug

Security Affairs

SonicWall confirmed that some of its Email Security and firewall products have been impacted by the Y2K22 bug. Security vendor SonicWall confirmed that some of its Email Security and firewall products have been impacted by the Y2K22 bug. According to the company, starting January 1, 2022, its Email Security products began experiencing an issue causing junk box and message log updates to fail.

article thumbnail

BSides Halifax 2021 – Closing Keynote: Matia Katz’ ‘From Napkin To Company – An Edge Micro-Segmentation Story’

Security Boulevard

Our thanks to BSides Halifax for publishing their tremendous videos from the BSides Halifax 2021 Conference on the organization’s’ YouTube channel. Enjoy! Permalink. The post BSides Halifax 2021 – Closing Keynote: Matia Katz’ ‘From Napkin To Company – An Edge Micro-Segmentation Story’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Medical Review Institute of America Notifies Patients of Data Breach

CyberSecurity Insiders

SALT LAKE CITY–( BUSINESS WIRE )–Medical Review Institute of America (“MRIoA”), an organization providing clinical peer reviews, on behalf of some of its health plan, health care provider and other customers, is notifying certain individuals whose information was affected by a recent data security incident. On November 9, 2021, MRIoA discovered that it was the victim of a sophisticated cyber-attack.

article thumbnail

XKCD ‘Throat And Nasal Passages’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Throat And Nasal Passages’ appeared first on Security Boulevard.

81
article thumbnail

Honda cars in flashback to 2002 – “Can’t Get You Out Of My Head”

Naked Security

Where were YOU on the night of 17 May 2002? And what about the day after that?

94
article thumbnail

500M Avira Antivirus Users Introduced to Cryptomining

Security Boulevard

Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn't alone in this dubious endeavor: Avira antivirus -- which has built a base of 500 million users worldwide largely by making the product free -- was recently bought by the same company that owns Norton 360 and is introducing its customers to a service called Avira Crypto.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.