Cryptojacked routers reduce by 78% in SE Asia following Operation Goldfish Alpha

Cryptojacked routers reduce by 78% in SE Asia following Operation Goldfish Alpha

by Graham CLULEY, from IoT Security Insights , on 09.01.2020

With so much bad news surrounding the subject of IoT security it's a relief occasionally to be able share news of some positive developments occasionally. This week, INTERPOL announced that a campaign it co-ordinated in Southeast Asia had dramatically reduced the number of infected devices across the region. Operation Goldfish Alpha was a six-month effort to ... The post Cryptojacked routers reduce by 78% in SE Asia following Operation Goldfish Alpha appeared first on Bitdefender. read more

Latest Android Security Patch Fixes Media Framework Vulnerability and More

Latest Android Security Patch Fixes Media Framework Vulnerability and More

by Silviu STAHIE, from IoT Security Insights , on 09.01.2020

Google’s Android Security Bulletin of 2020 details the critical patches made available for operating systems, and it’s nothing that should worry users much. One of the most pressing issues that had to be fixed is a critical security vulnerability in the Media framework, but very particular requirements had to be met for an attacker to ... The post Latest Android Security Patch Fixes Media Framework Vulnerability and More appeared first on Bitdefender. read more

API Security a Top Concern for Cybersecurity in 2020

API Security a Top Concern for Cybersecurity in 2020

by Business Insights , on 09.01.2020

The role of the application programmable interface (API) keeps rising in prominence within the enterprise. And as that happens, so does the risk of APIs as an enterprise attack surface. According to security experts, API security will be a top concern for many cybersecurity organizations in the coming year. API security is no longer a problem of the future—widespread API proliferation is already here, after all. According to a report earlier this year from Akamai, a full 83% of web traffic today is now API traffic. There are a number of factors that are increasing the prevalence—and the importance-- of APIs within organizations both large and small. read more

Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining

Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining

by Liviu ARSENE, from Bitdefender Labs , on 07.01.2020

The Mirai botnet that made headlines in 2016 for taking out infrastructure through large-scale network attacks has become a reference point in the security industry for the damage that large IoT botnets can inflict. Since its source code was published and made available to anyone interested in building their own botnet, many Mirai variants have […] read more

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

by Liviu ARSENE, from Bitdefender Labs , on 18.12.2019

Bitdefender researchers recently found threat actors abusing a legitimate feature in the RDP service to act as a fileless attack technique, dropping a multi-purpose off-the-shelf tool for device fingerprinting and for planting malware payloads ranging from ransomware and cryptocurrency miners to information and clipboard stealers. The attack vector involves the Windows Remote Desktop Server. The […] read more

Revisiting Glupteba: Still Relevant Five Years after Debut

Revisiting Glupteba: Still Relevant Five Years after Debut

by Bogdan BOTEZATU, from Bitdefender Labs , on 16.12.2019

In the fast-paced world of cybersecurity, malware normally gets a brief period in the spotlight before it falls into oblivion. This is not the case with Glupteba, a backdoor first spotted in 2014 that has undergone major changes to stay relevant. At the end of 2018, our Advanced Threat Control team observed a considerable wave […] read more

Multiple Vulnerabilities in Belkin WeMo Insight Switch

Multiple Vulnerabilities in Belkin WeMo Insight Switch

by Bitdefender Team, from Bitdefender Labs , on 11.12.2019

Internet of Things devices have become commonplace in modern homes. Relatively inexpensive and easy to control remotely, they promise a world at your fingertips. Security vulnerabilities in connected devices can not only affect the user experience but can also give cyber-criminals an open door to your local network. This is also the case with the […] read more

Ring Video Doorbell Pro Under the Scope

Ring Video Doorbell Pro Under the Scope

by Bitdefender Team, from Bitdefender Labs , on 06.11.2019

This article – part of a series developed in partnership with PCMag – aims to shed some light about the security of world’s best-sellers in the IoT space. PCMag contacted the research team at Bitdefender and asked us to have a look at several popular devices, including the Ring Video Doorbell Pro. More info about […] read more

Dozens of Apps Still Dodging Google’s Vetting System

Dozens of Apps Still Dodging Google’s Vetting System

by Liviu ARSENE, from Bitdefender Labs , on 30.10.2019

Bitdefender researchers recently analyzed 25 apps that made it into Google Play, at least for a time, packing aggressive adware SDKs that bombarded users with ads and avoided removal by hiding their presence. Cumulatively, the apps were apparently downloaded almost 700,000 times by Google Play users. While Google has gone to great lengths to ban […] read more

Ouroboros Ransomware decryption tool

Ouroboros Ransomware decryption tool

by Bitdefender Team, from Bitdefender Labs , on 28.10.2019

Ouroboros ransomware has been around for more than a year in various forms, operated by different cybercrime groups. Ouroboros, known to spread via Remote Desktop Protocol bruteforce attacks and deceptive downloads, has claimed a significant number of victims worldwide. We’re now happy to announce the availability of a new decryptor that can restore the .Lazarus, […] read more

<< Prev Next >>