Skip to main content

Security

Trolls exploit Zoom privacy settings as app gains popularity

posted onMarch 27, 2020
by l33tdawg
Credit: The Guardian

Working and socialising from home has brought new risks to everyday life, as webcam meetings and chatroom cocktail hours contend with privacy invasions, phishing attacks and “zoombombings” – uninvited guests abusing the popular video service to broadcast shocking imagery to all.

Public Zoom hangouts have become a popular way to spend time for isolated remote workers, who are joining calls with names such as “WFH Happy Hour” to spend time in the company of others.

Google sent users 40,000 warnings of nation-state hack attacks in 2019

posted onMarch 27, 2020
by l33tdawg
Credit: Arstechnica

Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government officials, journalists, dissidents, and geopolitical rivals being the most targeted, team members said on Thursday.

Critical bugs in dozens of Zyxel and Lilin IoT models under active exploit

posted onMarch 23, 2020
by l33tdawg
Credit: Arstechnica

Criminals are exploiting critical flaws to corral Internet-of-things devices from two different manufacturers into botnets that wage distributed denial-of-service attacks, researchers said this week. Both DVRs from Lilin and storage devices from Zyxel are affected, and users should install updates as soon as possible.

Guy who named 'BlueKeep' Windows flaw joins Microsoft Threat Protection

posted onMarch 4, 2020
by l33tdawg
Credit: Wikipedia

Kevin Beaumont, the UK cybersecurity expert who named the wormable Windows BlueKeep bug, is joining Microsoft Threat Protection.

Beaumont, a widely quoted security expert who's run large security operations centers, has offered insights from the trenches into new attacks via his popular DoublePulsar blog and Twitter for the past few years, covering issues including WannaCry, NSA exploits, the rise of malicious Office macros, and BlueKeep.

Rootkit in the Cloud: Hacker Group Breaches AWS Servers

posted onMarch 4, 2020
by l33tdawg
Credit: CBR Online

A sophisticated hacker group pwned Amazon Web Services (AWS) servers, set up a rootkit that let them remotely control servers, then merrily funnelled sensitive corporate data home to its command and control (C2) servers from a range of compromised Windows and Linux machines inside an AWS data centre.

Chinese security firm says CIA hacked Chinese targets for the past 11 years

posted onMarch 4, 2020
by l33tdawg
Credit: ZDNet

China's largest cyber-security vendor has published today a report accusing the CIA of hacking Chinese companies and government agencies for more than 11 years.

The report, authored by Qihoo 360, claims the CIA hacked targets in China's aviation industry, scientific research institutions, petroleum industry, Internet companies, and government agencies.

Hackers are actively exploiting zero-days in several WordPress plugins

posted onMarch 2, 2020
by l33tdawg
Credit: ZDNet

WordPress is, by far, the most widely used website building technology on the internet. According to the most recent statistics, more than 35% of all internet websites run on versions of the WordPress CMS (content management system).

Due to its huge number of active installations, WordPress is a massive attack surface. Attempts to hack into WordPress sites are like a constant hum in the background of all internet traffic, going on at any given time.