Hackers are taking cities hostage. Although cybersecurity experts suggest not giving in and not paying ransoms, a city in Florida is trying to follow the demand for blackmail attacks, hoping to get the data back.
After Riviera Beach’s city network was attacked ransomware, all of the data was locked with encryption keys, forcing the city council to vote to decide whether to pay 600,000 US dollars in bitcoins to hackers. Read the rest of this post »
Published by Emerson L. Sullivan on June 26, 2019 6:57 am
Mirai is a terrible IoT botnet that has caused headaches for DDos attacks worldwide. Now Mirai’s variant seems to have emerged. According to security researchers, it not only uses Mirai’s similar evolution strategy, but also seems to be based on the Mirai architecture, and its attack power is greatly increased. Read the rest of this post »
Published by Emerson L. Sullivan on June 24, 2019 3:20 am
On the afternoon of June 18th, Facebook Libra officially launched the Libra white paper on cryptocurrency, and announced that Libra’s mission is to build simple, borderless currencies and financial infrastructure for billions of people.
According to a white paper published by Facebook, Libra will be built on a secure, scalable and reliable blockchain. It will be governed by an independent Libra association whose mission is to promote the development of this financial ecosystem. Libra is empowered to intrinsic value Backed by asset reserves. Read the rest of this post »
Published by Emerson L. Sullivan on June 20, 2019 2:02 am and last modified on June 20, 2019 6:32 am.
Though professional safety personnel generally understand that code-signing attacks pose a threat to the enterprise, they currently have not taken appropriate measures to protect enterprise from attacks. If the code signing keys and certificates that acts as the identity of machine fall into the hands of the attacker, they would undoubtedly cause great damage. Read the rest of this post »
Published by Emerson L. Sullivan on June 13, 2019 2:30 am and last modified on June 13, 2019 2:32 am.
The Cryptohopper platform, which mainly provides automated cryptocurrency trading services, has recently found a high imitation version. In addition to the different URLs, the clone of the Cryptohopper platform uses the same trademarks and layouts as the official website of Cryptohopper, which is not harmful. The bad thing is that an executable file will be automatically downloaded once the Trojan is triggered. Although there is a trademark of Cryptohopper, it is actually a Vidar Trojan. Read the rest of this post »
Published by Emerson L. Sullivan on June 10, 2019 3:35 am and last modified on June 10, 2019 3:39 am.
AppRiver Security found that Azure Cloud Services still has security issues from phishing templates to malware and command and control services. Research found that its root cause is in Microsoft’s Azure infrastructure. Read the rest of this post »
Published by Emerson L. Sullivan on June 6, 2019 2:26 am
Apple, Microsoft, Google and other IT giants jointly announced a public letter on May 30, condemning the British intelligence agency GCHQ’s plan to monitor encrypted content announced last year, which could pose a threat to personal privacy and network security. Read the rest of this post »
Published by Emerson L. Sullivan on June 3, 2019 2:45 am
A new ransomware called GetCrypt has been detected. It uses the RigEK exploit tool to spread attacks on users when they visit foreign websites, and encrypts computer files to modify the user’s desktop ransom. Read the rest of this post »
Published by Emerson L. Sullivan on May 30, 2019 1:40 am
Security researchers have found an unpatched vulnerability that can completely bypass macOS Gatekeeper security feature to run malicious code. You should watch out for this vulnerability when running applications on your Mac. This vulnerability was first informed by Apple on February 22. However, the latest macOS update hasn’t fixed the vulnerability even though it was supposed to. Read the rest of this post »
Published by Emerson L. Sullivan on May 27, 2019 2:49 am and last modified on May 27, 2019 2:49 am.
A security researcher, nicknamed SandboxEscaper, announced the fifth zero-day vulnerability since August last year. The new vulnerability exists in Windows 10’s Task Scheduler and will allow local hackers to extend general privileges to administrative privileges. Read the rest of this post »
Published by Emerson L. Sullivan on May 24, 2019 1:35 am and last modified on May 24, 2019 1:36 am.