Remcos RAT Revisited: A Colombian Coronavirus-Themed Campaign

Remcos RAT Revisited: A Colombian Coronavirus-Themed Campaign

by Janos Gergo SZELES, from Bitdefender Labs , on 12.01.2021

In the late summer of 2020, the Bitdefender Active Threat Control team noticed a surge of Remcos malware, with most of the attacks taking place in Colombia. While the malware family has been known for quite a while to cyber-criminals and malware researchers alike, this new campaign captured our attention as it arrived on the […] read more

Darkside Ransomware Decryption Tool

Darkside Ransomware Decryption Tool

by Bitdefender Team, from Bitdefender Labs , on 11.01.2021

We’re happy to announce the availability of a decryptor for Darkside. This family of ransomware has emerged in August 2020 and operates operate under a ransomware-as-a-service business model. How to use this tool Step 1: Download the decryption tool below and save it on your computer. Step 2: Double-click the file (previously saved as BDDarkSideDecryptor.exe) and […] read more

New Malware Uses WiFi BSSID to Determine the Victim’s Location

New Malware Uses WiFi BSSID to Determine the Victim’s Location

by Silviu STAHIE, from IoT Security Insights , on 06.01.2021

A security researcher has identified a new malware sample that uses an interesting technique to determine the potential victim's location, without using the various GeoIP API services. Some hackers don't want to draw attention to their activities in the countries they operate from, and they usually give their attacks features that let them determine the ... The post New Malware Uses WiFi BSSID to Determine the Victim's Location appeared first on Bitdefender. read more

Three Security Headaches in 2021 and the Technologies to Fix Them

Three Security Headaches in 2021 and the Technologies to Fix Them

by Filip Truta, from Business Insights , on 06.01.2021

Remote workers have become lucrative ground for lurking cybercriminals Scams purporting to sell COVID-19 vaccines are cropping up with allusions to shortages IT reps, meanwhile, are overburdened and under-resourced leaving gaps for malicious actors to exploit The ransomware landscape is almost entirely dominated by professionals, leaving one-offs scrambling for affiliation Cyber actors are showing interest in critical industry verticals, like healthcare, education and municipal infrastructures read more

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

IT Leaders Rank Data Breaches as the Top Technology Risk for 2021

by Filip Truta, from Business Insights , on 05.01.2021

80% of digital leaders plan to address ‘cyber breach’ risk in 2021 audit plans IT leaders in North America, Africa, Asia, Europe, the Middle East and Oceania all ranked ‘cyber breaches’ as their top concern Digitally mature organizations stand out in their frequency of performing technology audit risk assessments 67% of organizations do not classify themselves as digital leaders ‘Cyber breaches’ are consistently a primary concern across key industry sectors read more

FBI Says Swatters Now Hack into Smart Devices to Live-Stream SWAT Intervention

FBI Says Swatters Now Hack into Smart Devices to Live-Stream SWAT Intervention

by Silviu STAHIE, from IoT Security Insights , on 04.01.2021

The FBI warns that swatters have upped their game and are now hijacking smart devices in victims' homes to live-stream the law enforcement intervention or record the swatting attacks. In swatting, someone calls emergency services and shares false information about the presence of violent criminals or weapons at the victims' location. The intention is to ... The post FBI Says Swatters Now Hack into Smart Devices to Live-Stream SWAT Intervention appeared first on Bitdefender. read more

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

Study: 5 Key Factors are Influencing the Cyber Threat Landscape

by Business Insights , on 04.01.2021

Cyber criminals are changing their tactics to take advantage of emerging vulnerabilities, according to a new report. Five key factors are influencing the cyber threat landscape. By taking certain steps, organizations can build a more security and agile environment. read more

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

by Business Insights , on 03.01.2021

Not enough organizations are continuously looking for risks in their IT assets. Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface. Enterprises need to put monitoring regimes in place that can keep pace with technological change. read more

CISA Warns of Multiple Trek TCP/IP Stack Vulnerabilities

CISA Warns of Multiple Trek TCP/IP Stack Vulnerabilities

by Silviu STAHIE, from IoT Security Insights , on 31.12.2020

The Cybersecurity Infrastructure and Security Agency (CISA) is warning of yet another TCP/IP stack vulnerability problem that could lead to remote code execution and denial-of-service attacks. The TCP/IP stack is not a visible layer, and it’s usually comprised of various protocols responsible for all Internet traffic. But, like many other components, it’s not a uniform ... The post CISA Warns of Multiple Trek TCP/IP Stack Vulnerabilities appeared first on Bitdefender. read more

Researchers Use Microphones to Guess PINs and Passwords Typed on Virtual Keyboards

Researchers Use Microphones to Guess PINs and Passwords Typed on Virtual Keyboards

by Silviu STAHIE, from IoT Security Insights , on 30.12.2020

Security researchers from the University of Cambridge discovered that attackers could use smart assistants such as Alexa or Google Home to spy on people in their vicinity by listening for typing sounds on virtual keyboards and recovering PINs and passwords. Using microphones to listen to what people type on their keyboards is nothing new. They ... The post Researchers Use Microphones to Guess PINs and Passwords Typed on Virtual Keyboards appeared first on Bitdefender. read more

<< Prev Next >>