D-Link Patches Zero-Day Vulnerabilities, Others Still Remain

D-Link Patches Zero-Day Vulnerabilities, Others Still Remain

by Ionut ILASCU, from IoT Security Insights , on 22.09.2017

Networking equipment maker D-Link has released a patch for a series of vulnerabilities affecting one of its routers. The security flaws, disclosed publicly almost two weeks ago without alerting the manufacturer, could allow a hacker to fully control the device through various methods. Issues have been reported for other devices, but an update is not ... The post D-Link Patches Zero-Day Vulnerabilities, Others Still Remain appeared first on Bitdefender. read more

Tech Festival Copenhagen: The Future of Learning in the Digital Age

Tech Festival Copenhagen: The Future of Learning in the Digital Age

by Cristina POPOV, from IoT Security Insights , on 18.09.2017

The future is here. Technology is already changing the way our children learn. Are schools, parents, and teachers ready for a change in traditional learning practices? Although the process is inevitable, we still have choices. How do we react? Should we take advantage of tech opportunities or hold on to practices proven to work well ... The post Tech Festival Copenhagen: The Future of Learning in the Digital Age appeared first on Bitdefender. read more

EHDevel – The story of a continuously improving advanced threat creation toolkit

EHDevel – The story of a continuously improving advanced threat creation toolkit

by Alexandru MAXIMCIUC, from Bitdefender Labs , on 01.09.2017

More than a year ago, on July 26th 2016, the Bitdefender Threat Intelligence Team came across a suspicious document called News.doc.  However, unlike most potentially malicious documents that get processed in our labs, this file displayed similarities with a set of files known to have been used in separate attacks targeted at different institutions. Our […] read more

Three New Pacifier APT Components Point to Russian-Linked Turla Group

Three New Pacifier APT Components Point to Russian-Linked Turla Group

by Liviu ARSENE, from Bitdefender Labs , on 01.09.2017

In 2016, Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. Our previous analysis of the Pacifier components revealed that it’s capable of dropping multi-stage backdoors […] read more

Remote ownage of 100k+ Camera and Gateway devices demonstrated at Defcon

Remote ownage of 100k+ Camera and Gateway devices demonstrated at Defcon

by Bogdan BOTEZATU, from Bitdefender Labs , on 02.08.2017

It’s now anno domini 2017 and the number of Internet-connected devices surpass the living population by an order of magnitude. And while most of these devices help us reinvent the way we interact with our homes, our offices or with our own bodies, some “smart things” can lend hackers a helping hand in digital burglary. […] read more

Remote Exploitation of the NeoCoolcam IP Cameras and Gateway

Remote Exploitation of the NeoCoolcam IP Cameras and Gateway

by Bogdan BOTEZATU, from Bitdefender Labs , on 02.08.2017

The Internet of connected things has changed the way we interact with our homes, offices or even with our own bodies. But although connected devices are sold mostly everywhere, some manufacturers don’t dwell on the security aspects, but rather focus on features and time to market. In 2016, security researchers from Bitdefender detected multiple vulnerabilities […] read more

Inexsmar: An unusual DarkHotel campaign

Inexsmar: An unusual DarkHotel campaign

by Bogdan BOTEZATU, from Bitdefender Labs , on 18.07.2017

The DarkHotel threat actors have been known to operate for a decade now, targeting thousands of businesses across the world via Wi-Fi infrastructure in hotels. Blending whaling (high-level spear phishing) techniques with advanced malware and other complex attack avenues (such as digital certificate factoring), the threat actors have been able to run their business undisturbed […] read more

A technical look into the GoldenEye ransomware attack

A technical look into the GoldenEye ransomware attack

by Bogdan BOTEZATU, from Bitdefender Labs , on 07.07.2017

On June 27th, reports of a rapidly spreading ransomware attack started to emerge from Ukraine. The speed at which critical infrastructure networks were shutting down pointed to a ransomware application with a wormable component, whose virality called to mind the WannaCry ransomware. In less than three hours, the infection crippled banks, ATMs, public transport and […] read more

Massive GoldenEye Ransomware Campaign Slams worldwide users

Massive GoldenEye Ransomware Campaign Slams worldwide users

by Bogdan BOTEZATU, from Bitdefender Labs , on 27.06.2017

Several critical infrastructure institutions in Ukraine have already been taken offline   Update 6/28 16.30 GMT+3 Our internal telemetry shows that some infections with #GoldenEye have been triggered by the compromised update of the MeDOC accounting software. A number of our customers in Ukraine where our solutions intercepted the attack clearly show explorer.exe starting up ezvit.exe (the accounting […] read more

Bitdefender Home Scanner

Bitdefender Home Scanner

by Bogdan BOTEZATU, from Bitdefender Labs , on 30.05.2017

Do you know who connects to your Wi-Fi network?  Stop hackers and privacy intruders from taking advantage of security holes to log on to your home network, spy on your family, steal your private information or even hijack your devices. With Bitdefender Home Scanner you are always in control. Bitdefender Home Scanner – scan for weaknesses […] read more

<< Prev Next >>