Stu Sjouwerman Security researchers have discovered a new fileless ransomware in the wild, which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destructs … Continue reading
Lax privacy settings in a campus file-sharing network led to an unintentional exposure of the educational records of thousands of students at Oklahoma University. How many victims? At least 29,000. What … Continue reading
WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices.
A buried line in a new Facebook report about chatbots’ conversations with one another offers a remarkable glimpse at the future of language. In the report, researchers at the Facebook … Continue reading
Hackers have all kinds of tools to breach your company’s network, including military-grade exploits and viruses. But the most wide-ranging hacks start with low-tech methods and social engineering, says David Kennedy, who started in computer security waging cyberwar for the U.S. government, including the National Security Agency, and is now a professional hacker who helps companies find security weaknesses.
Enterprise password manager OneLogin suffered a massive data breach Wednesday, and the attackers may have gained access to sensitive customer data, such as login information for a variety of companies. OneLogin manages login credentials for a variety of cloud applications for more than 2,000 enterprise clients.
Jaff Malware Probe Uncovers Link to Cybercrime Marketplace | Threatpost | The first stop for security news
An investigation into a new strain of Jaff ransomware uncovered a shared backend infrastructure between the malware and a black market bazaar selling stolen bank and credit card account information.