Virus / Malware

Retour à Sécurité

Malwarebytes

    • 6 août 2020Inter skimming kit used in homoglyph attacks
      As we continue to track web threats and credit card skimming in particular, we often rediscover techniques we’ve encountered elsewhere before. In this post, we share a recent find that involves what is known as an homoglyph attack. This technique has been exploited for some time already, especially in phishing scams with IDN homograph attacks. The idea is simple and consists of using charact …

    • 5 août 2020Data Accountability and Transparency Act of 2020 looks beyond consent
      In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t have to be. In June, Democratic Senator Sherrod Brown of Ohio released a discussion draft of a new data privacy bill to improve Americans’ data privacy rights and their relationship with the countless companies that collect, store, and share their personal data. While the …

    • 4 août 2020Business email compromise: gunning for goal
      The evergreen peril of business email compromise (BEC) finds itself in the news once more. This time, major English Premier League football teams almost fell victim to their trickery, to the tune of £1 million. First half: fraudsters on the offensive Somebody compromised a Managing Director’s email after they logged into a phishing portal via bogus email. Fake accounts set up during the transfer w …

    • 3 août 2020Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
      This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Chuck Brooks, cybersecurity evangelist and adjunct professor for Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, about identity and access management technology. This set of technologies and policies controls …

    • 31 juillet 2020Avoid these PayPal phishing emails
      For the last few weeks, there’s been a solid stream of fake PayPal emails in circulation, twisting FOMO (fear of missing out) into DO THIS OR BAD THINGS WILL HAPPEN. It’s one of the most common tools in the scammer’s arsenal, and a little pressure applied in the right way often brings results for them. Claim people are going to lose something, or incur charges, or miss out on a valuable service, a …

    • 30 juillet 2020Malspam campaign caught using GuLoader after service relaunch
      They say any publicity is good publicity. But perhaps this isn’t true for CloudEye, an Italian firm that claims to provide “the next generation of Windows executables’ protection”. First described by Proofpoint security researchers in March 2020, GuLoader is a downloader used by threat actors to distribute malware on a large scale. In June, CloudEye was exposed by CheckPoin …

    • 29 juillet 2020Cloud workload security: Should you worry about it?
      Due to the increasing use of the cloud, organizations find themselves dealing with hybrid environments and nebulous workloads to secure. Containerization and cloud-stored data have provided the industry with a new challenge. And while you can try to make the provider of cloud data storage responsible for the security of the data, you will have a hard time trying to convince the provider that they …

    • 28 juillet 2020TikTok is being discouraged and the app may be banned
      In recent news retail giant Amazon sent a memo to employees telling them to delete the popular social media app TikTok from their phones. In the memo it stated that the app would pose a security risk without going into details. Later the memo was withdrawn without an explanation except that it was sent in error. Are we curious yet, my dear Watson? What is TikTok For those of us that can’t tell one …

    • 27 juillet 2020A week in security (July 20 – 26)
      Last week on Malwarebytes Labs, our Lock and Code podcast delved into Bluetooth and beacon technology. We also dug into APT groups targeting India and Hong Kong, covered a law enforcement bust, and tried to figure out when, exactly, a Deepfake is a Deepfake. Other cybersecurity news Insecure email addresses resulted in big-bucks sporting targets (Source: Silicon)What do you do when a lack of backu …

    • 23 juillet 2020Deepfakes or not: new GAN image stirs up questions about digital fakery
      Subversive deepfakes that enter the party unannounced, do their thing, then slink off into the night without anybody noticing are where it’s at. Easily debunked clips of Donald Trump yelling THE NUKES ARE UP or something similarly ludicrous are not a major concern. We’ve already dug into why that’s the case. What we’ve also explored are the people-centric ways you can train your eye to spot stand- …

ESET

    • 6 août 2020Beyond KrØØk: Even more Wi‑Fi chips vulnerable to eavesdropping
      At Black Hat USA 2020, ESET researchers delved into details about the KrØØk vulnerability in Wi-Fi chips and revealed that similar bugs affect more chip brands than previously thought The post Beyond KrØØk: Even more Wi‑Fi chips vulnerable to eavesdropping appeared first on WeLiveSecurity …

    • 6 août 2020Blackbaud data breach: What you should know
      Here’s what to be aware of if your personal data was compromised in the breach at the cloud software provider The post Blackbaud data breach: What you should know appeared first on WeLiveSecurity …

    • 5 août 2020NSA shares advice on how to limit location tracking
      The intelligence agency warns of location tracking risks and offers tips for how to reduce the amount of data shared The post NSA shares advice on how to limit location tracking appeared first on WeLiveSecurity …

    • 4 août 2020FBI warns of surge in online shopping scams
      In one scheme, shoppers ordering gadgets or gym equipment are in for a rude surprise – they receive disposable face masks instead The post FBI warns of surge in online shopping scams appeared first on WeLiveSecurity …

    • 3 août 2020How much is your personal data worth on the dark web?
      The going prices are lower than you probably think – your credit card details, for example, can sell for a few bucks The post How much is your personal data worth on the dark web? appeared first on WeLiveSecurity …

    • 31 juillet 2020Week in security with Tony Anscombe
      New ESET Threat Report is out – Defending against Thunderspy attacks – Thousands of databases wiped in Meow attacks The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • 31 juillet 2020Twitter breach: Staff tricked by ‘phone spear phishing’
      The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures The post Twitter breach: Staff tricked by ‘phone spear phishing’ appeared first on WeLiveSecurity …

    • 29 juillet 2020ESET Threat Report Q2 2020
      A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report Q2 2020 appeared first on WeLiveSecurity …

ESET Support