Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 5

Mar 15, 2022

Exclusive: China captures powerful US NSA cyberspy tool

Posted by in categories: biotech/medical, cybercrime/malcode, internet

China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim’s computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users’ information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.

According to the report, the Trojan horse, “NOPEN,” is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device’s information.

Through technical analysis, the center believes that the “NOPEN” Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage.

Mar 15, 2022

Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords

Posted by in category: cybercrime/malcode

French video game company Ubisoft on Friday confirmed it was a victim of a “cyber security incident,” causing temporary disruptions to its games, systems, and services.

The Montreuil-headquartered firm said that an investigation into the breach was underway and that it has initiated a company-wide password reset as a precautionary measure.

“Also, we can confirm that all our games and services are functioning normally and that at this time there is no evidence any player personal information was accessed or exposed as a by-product of this incident,” the company said in a statement.

Mar 14, 2022

Researchers find new destructive wiper malware in Ukraine

Posted by in category: cybercrime/malcode

It’s at least the third strain of wiper since the conflict began.


Researchers from cybersecurity firm ESET have discovered a new destructive wiper malware, dubbed CaddyWiper, that is affecting computer networks in Ukraine.

Mar 13, 2022

Ubisoft says it experienced a ‘cyber security incident’, and the purported Nvidia hackers are taking credit

Posted by in category: cybercrime/malcode

There have been some other high profile hacks recently.


Ubisoft says it experienced a “cyber security incident” last week that temporarily disrupted some games, systems, and services. The company does not believe player personal information was exposed. An entity seemingly representing the hacking group LAPSUS$ is taking responsibility.

Mar 11, 2022

MercadoLibre, the biggest e-commerce company in Latin America, was hacked. Attackers leak source code and customer data

Posted by in category: cybercrime/malcode

MercadoLibre, one of the most important e-commerce companies in Latin America, confirmed unauthorized access to a part of its source code, in addition to confirming that the attackers managed to access the personal records of some 300,000 users. The company has not confirmed that its IT infrastructure was affected during the incident.

The Argentine firm confirmed the compromise of its systems after hackers from the Latin American group Lapsus$ threatened to expose confidential information from MercadoLibre and other e-commerce platforms. Faced with this threat, MercadoLibre enabled all its security and containment protocols, so it recommended that users of the platform change their passwords and monitor their account statements to prevent any attempt at malicious activity.

Continue reading “MercadoLibre, the biggest e-commerce company in Latin America, was hacked. Attackers leak source code and customer data” »

Mar 11, 2022

Millions of HP laptops, points of sale machines and servers affected by 16 critical vulnerabilities

Posted by in category: cybercrime/malcode

A report by cybersecurity firm Binarly points to the detection of 16 critical vulnerabilities in various implementations of Unified Extensible Firmware Interface (UEFI), present in multiple HP enterprise devices. According to the researchers, threat actors can exploit these flaws to implant firmware capable of evading UEFI Secure Boot, Intel Boot Guard, and virtualization-based security measures.

Mar 11, 2022

3 XSS vulnerabilities in IBM Security QRadar SOAR: Update immediately

Posted by in category: cybercrime/malcode

Cybersecurity specialists reported the detection of multiple vulnerabilities in IBM Security QRadar SOAR. According to the report, successful exploitation of these flaws would allow the deployment of severe attack scenarios.

Below are brief descriptions of the reported flaws, in addition to their tracking keys and scorings assigned according to the Common Vulnerability Scoring System (CVSS).

Continue reading “3 XSS vulnerabilities in IBM Security QRadar SOAR: Update immediately” »

Mar 11, 2022

Hackers Abuse Mitel Devices to Amplify DDoS Attacks by 4 Billion Times

Posted by in category: cybercrime/malcode

Hackers abuse Mitel devices to perform high-impact amplification attacks to stage massive DDoS attacks with a record-breaking amplification ratio.


Researchers have discovered three critical vulnerabilities in APC Smart-UPS.

Mar 11, 2022

Critical Bugs Could Let Attackers Remotely Hack, Damage APC Smart-UPS Devices

Posted by in category: cybercrime/malcode

Researchers have discovered three critical vulnerabilities in APC Smart-UPS.

Mar 11, 2022

The Incident Response Plan — Preparing for a Rainy Day

Posted by in category: cybercrime/malcode

Just as it wasn’t raining when Noah built the ark, companies must face the fact that they need to prepare — and educate the organization on — a well-thought-out response plan if a successful cyberattack does occur. Obviously, the worst time to plan your response to a cyberattack is when it happens.

With so many companies falling victim to cyberattacks, an entire cottage industry of Incident Response (IR) services has arisen. Thousands of IR engagements have helped surface best practices and preparedness guides to help those that have yet to fall victim to a cyberattack.

Recently, cybersecurity company Cynet provided an Incident Response plan Word template to help companies plan for this unfortunate occurrence.

Page 5 of 130First23456789Last