Six Times More Data Breaches Reported in Canada after Disclosure Rules Tightened

Six Times More Data Breaches Reported in Canada after Disclosure Rules Tightened

by Silviu STAHIE, from HotForSecurity , on 04.11.2019

The number of reported data breaches in Canada increased six-fold after the country implemented new breach-reporting regulations under a federal private sector privacy law. Amendments introduced last year to the 19-year-old federal Personal Information Protection and Electronic Documents Act forced companies to report all data breaches affecting an organization. Now the results are in. By [and#8230;] read more

Dozens of Apps Still Dodging Google’s Vetting System

Dozens of Apps Still Dodging Google’s Vetting System

by Liviu ARSENE, from Bitdefender Labs , on 30.10.2019

Bitdefender researchers recently analyzed 25 apps that made it into Google Play, at least for a time, packing aggressive adware SDKs that bombarded users with ads and avoided removal by hiding their presence. Cumulatively, the apps were apparently downloaded almost 700,000 times by Google Play users. While Google has gone to great lengths to ban […] read more

Ouroboros Ransomware decryption tool

Ouroboros Ransomware decryption tool

by Bitdefender Team, from Bitdefender Labs , on 28.10.2019

Ouroboros ransomware has been around for more than a year in various forms, operated by different cybercrime groups. Ouroboros, known to spread via Remote Desktop Protocol bruteforce attacks and deceptive downloads, has claimed a significant number of victims worldwide. We’re now happy to announce the availability of a new decryptor that can restore the .Lazarus, […] read more

A close look at Fallout Exploit Kit and Raccoon Stealer

A close look at Fallout Exploit Kit and Raccoon Stealer

by Bogdan BOTEZATU, from Bitdefender Labs , on 14.10.2019

Over the last few months, we have seen increased Exploit Kit activity. One example is the Fallout Exploit Kit, which we will describe in depth in this article. Since its emergence in August 2018, threat actors have intensively used the Fallout Exploit Kit to deliver ransomware (GandCrab, Kraken, Maze, Minotaur, Matrix and Stop), Banker Trojans […] read more

Wrapping up the 2019 PwnThyBytes CTF

Wrapping up the 2019 PwnThyBytes CTF

by Bitdefender Team, from Bitdefender Labs , on 10.10.2019

Here we are at the end of the first edition of the PwnThyBytes Capture The Flag Competition. We hope it was a challenging, learning and intriguing experience for all teams that took part. As organizers, we can say it certainly was for us. Without further ado, here are the winners of the contest: First place […] read more

Who IsErIk: A Resurface of an Advanced Persistent Adware?

Who IsErIk: A Resurface of an Advanced Persistent Adware?

by Bogdan BOTEZATU, from Bitdefender Labs , on 23.09.2019

As the malware industry expands, new tricks added to the cyber-criminal arsenal show up on a daily basis. Our Advanced Threat Control team has identified a massive expansion of the malicious repertoire meant to resurface old, but not-forgotten threats. The main focus of this analysis is an adware loader, first discovered in 2016, which has […] read more

Bitdefender is proud to announce PwnThyBytes Capture The Flag – our competitive ethical hacking contest

Bitdefender is proud to announce PwnThyBytes Capture The Flag – our competitive ethical hacking contest

by Bitdefender Team, from Bitdefender Labs , on 17.09.2019

We hope you’ve all enjoyed your summer holidays, chilling out on the beach, seeing new places and recharging your batteries. Because this autumn we’ve prepared the first edition of PwnThyBytes CTF, a top-notch global computer security competition, which we hope will be a fun and challenging experience for everybody. The contest starts on September 28th […] read more

Worm-Cryptominer Combo Lets You Game While Using NSA Exploits to Move Laterally

Worm-Cryptominer Combo Lets You Game While Using NSA Exploits to Move Laterally

by Liviu ARSENE, from Bitdefender Labs , on 20.08.2019

Bitdefender researchers recently found and analyzed a worm-cryptominer combo that uses a series of exploits to move laterally and compromise victims. What makes it interesting is that it pauses the resource-intensive cryptomining process if it finds popular games running on the victim’s machine. The investigation revealed that the worm-cryptominer has been constantly updated by its […] read more

New Homograph Phishing Attack Impersonates Bank of Valletta, Leverages Valid TLS Certificate

New Homograph Phishing Attack Impersonates Bank of Valletta, Leverages Valid TLS Certificate

by Liviu ARSENE, from Bitdefender Labs , on 07.08.2019

Bitdefender researchers recently uncovered a new IDN (internationalized domain name) homograph phishing attack in which attackers impersonate the Bank of Valletta, Malta. Bitdefender’s Deep Learning technologies, trained specifically to spot this type of homograph attack, quickly flagged the website for phishing. They triggered an investigation from our teams to better understand the mechanics behind it. […] read more

Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction

Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction

by Bitdefender Team, from Bitdefender Labs , on 06.08.2019

Bitdefender senior researchers Dan Horea Luțaș and Andrei Vlad Luțaș recently uncovered a new speculative-execution vulnerability and demonstrated how it can be exploited via a side-channel style attack, dubbed SWAPGS Attack. The vulnerability has been publicly reported today as CVE-2019-1125. While side-channel attacks have been known for some time now, speculative execution-based attacks are new, […] read more

<< Prev Next >>