Login

Register

Login

Register

Category

Cyber Security Alert
[ad_1] You don’t tug on Superman’s cape, you don’t spit into the wind, you don’t pull the mask off the old Lone Ranger and, with apologies to Jim Croce, you don’t mess around with medical and healthcare organizations battling the coronavirus pandemic, or you’ll face the full force of the COVID-19 CTI League, a group...
Read More
[ad_1] All of us have seen or issued guidance that looks something like this: “We are committed to doing our part to stem the spread of the COVID-19 virus. Consistent with guidance from the World Health Organization, the U.S. Centers for Disease Control and Prevention, and other national and local health authorities regarding efforts to...
Read More
[ad_1] Adobe issued a security advisory and patch for Creative Cloud Desktop Application version 5.0 and earlier for Windows. The advisory was issued late last week and centers on a single critical vulnerability, CVE-2020-3808, which is a time-of-check to time-of-use race condition that if exploited can lead to arbitrary file deletion. The issue can be...
Read More
[ad_1] Two zero-day vulnerabilities were being used by two different groups to infiltrate DrayTek Vigor enterprise routers and switch devices, enabling the attackers to access traffic and install backdoors. The invasive action was noticed first on Dec. 4, 2019 by Netlab 360 researchers affecting the Vigor2960 v1.5.1, Vigor300B v1.5.1 and Vigor3900 v1.5.1 routers along with...
Read More
[ad_1] An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian hacker forums, adding a formidable new competitor to an already crowded underground market. And while cybercriminals have met the offer with some healthy skepticism, the bargain-basement selling price of $2,000 may be alluring enough...
Read More
[ad_1] Access credentials for Campaign Sidekick app, used by Republican campaigns for voter contacts, surveys and canvassing, were exposed in a code repository within a publicly accessible .git directory, a version control system that records code base changes during software development so that developers can work from the same code.   “The same operations that...
Read More
[ad_1] Attackers are exploiting unpatched Windows zero day flaws, Microsoft said in a Monday security advisory. The company said “limited targeted attacks” could leverage two unpatched remote code executive (RCE) vulnerabilities in Windows “when the Windows Adobe Type Manager Library improperly handles a specially crafted multi-master font – Adobe Type 1 PostScript format.” Among the...
Read More
[ad_1] The hack of an FSB contractor has exposed details of the Russian intelligence agency’s cyber weapons program aimed at exploiting vulnerabilities in IoT devices. Digital Revolution, a Russian hacking group, has claimed credit for the April 2019 breach of subcontractor ODT (Oday) LLC, which was working with frequent Russian Ministry of Internal Affairs contractor...
Read More
[ad_1] The FBI’s Internet Crime Complaint Center (IC3) has issued a public service announcement warning citizens to watch out for email-based fraud and malware schemes that take advantage of the coronavirus pandemic. Among the scams to look out for are emails purporting to contain helpful information from the Centers for Disease Control and Prevention (CDC)...
Read More
[ad_1] The new Mirai variant Mukashi is targeting Zyxel network attached storage (NAS) devices using brute force attacks based on the default admin credentials and then exploiting CVE-2020-9054. Palo Alto Networks Unit 42 said almost all Zyxel NAS products running firmware versions up to 5.21 are susceptible. CVE-2020-9054 is a pre-authentication command injection vulnerability, which...
Read More
[ad_1] The cybercriminal gang behind Maze ransomware has been extorting a UK-based clinical research organization that’s been preparing to play a potential role in testing vaccine candidates for the novel coronavirus, despite assurances that they would not harm any health care organizations during the COVID-19 crisis. SC Media first reported an attack on the medical...
Read More
[ad_1] Research teams at the Pwn2Own 2020 competition successfully exploited 13 software vulnerabilities this past week, including bugs found in products from Adobe, Apple, Microsoft, Oracle and Ubuntu. Participants earned $270,000 over the two-day event — the first Pwn2Own ever to be held virtually, as a measure to combat the rapid spread of the novel...
Read More
[ad_1] Masses of global citizens have been retreating to their homes and relying on online services to stock up their domiciles during the coronavirus pandemic, and it could be having an influence on cyberattacks against websites. Researchers at application protection company PerimeterX have reported a two-month increase in account takeover attacks against online home goods...
Read More
[ad_1] Home > Security News > Malware In an effort to make malware appear legitimate and help it sneak past security software, groups using two well-known trojans are inserting news text from Coronavirus stories into their file descriptions. Padding malware with fake news is not new but Bleeping Computer has found Trickbot and Emotet now...
Read More
[ad_1] Batches of security advisories were rolled out by Drupal, Google and Cisco yesterday addressing a host of critical-rated issues for their products. Drupal addressed a critical vulnerability affecting Drupal 8.7 and 8.8. The issue is a Cross Site Scripting vulnerability in third-party libraries. An attacker that can create or edit content may be able...
Read More
[ad_1] Is your organization ready to securely support a wide range of remote workers in the wake of a global pandemic? With cases of coronavirus mounting in countries around the globe and the Centers for Disease Control (CDC) warning citizens to be prepared for the likelihood the illness will spread across other regions of the...
Read More
[ad_1] Malicious actors have created a new module for the TrickBot banking trojan that allows the malware to perform brute force attacks on Microsoft’s Remote Desktop Protocol, specifically targeting U.S. and Hong Kong IP addresses. The module, called rdpScanDll, primarily focuses on the telecommunications, education, and financial services sectors, according to a new white paper...
Read More
[ad_1] A third-party service provider to Rogers Communications left open a database used for marketing purposes, exposing customer PII. The Canadian telecom provider did not name the firm involved, nor the number of people affected, but reported that the incident was uncovered on Feb. 26, 2020 and involved the service provider leaving a database open...
Read More
[ad_1] CheckPoint told SC Media that among new Coronavirus domains registered in past three weeks, .8 percent are malicious and another 19 percent are considered suspicious. Overall, 16,000 new Coronavirus-related domains have been registered since early January 2020. Topics: Web Security [ad_2] Original Source link
Read More
[ad_1] Certain members of the cybercriminal community, including a few malware developers and operators, have reportedly expressed a willingness to avoid attacking health care companies and other organizations that are key to battling the COVID-19 pandemic. Meanwhile, two cyber firms have pledged to offer free services to health care organizations hit by ransomware. BleepingComputer this...
Read More
1 2 3 4 18
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW