Spam and phishing in 2017

Figures of the year The share of spam in mail traffic came to 56.63%, down 1.68% against 2016. The biggest source of spam remains the US (13.21%). 40% of spam emails were less than...

Dell EMC Patches Critical Flaws in VMAX Enterprise Storage Systems

Attacks include a hard-coded password vulnerability that could give attackers unauthorized access to systems. Source: Threadpost

Researchers Find New Twists In ‘Olympic Destroyer’ Malware

Researchers now believe attackers may have had prior access to networks and that malware was more sophisticated than originally believed. Source: Threadpost

Bingo, Amigo! Jackpotting: ATM malware from Latin America to the World

Introduction Of all the forms of attack against financial institutions around the world, the one that brings traditional crime and cybercrime together the most is the malicious ecosystem that exists around ATM...

Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update

One of the bugs could allow a successful attack simply by a user viewing an email in Outlook's Preview pane. Source: Threadpost

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram

It's just the latest reported vulnerability for the secure messaging application. Source: Threadpost

Zero-day vulnerability in Telegram

In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when...

‘Olympic Destroyer’ Malware Behind Winter Olympics Cyberattack, Researchers Say

The malware's sole purpose was to take down systems, not steal data, Cisco Talos researchers say. Source: Threadpost

Romance Scams Drive Necurs Botnet Activity in Run Up to Valentine’s Day

Emails try to get recipients to share revealing photos of themselves so scammers can later extort them later. Source: Threadpost

U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner

The attack could have been averted through a technique called subresource integrity, according to researcher Scott Helme. Source: Threadpost
- Advertisement -

APLICATIONS

Siemens Firmware Updates Patch SIMATIC Vulnerabilities

Siemens has provided firmware updates addressing vulnerabilities in the SIMATIC WinCC flexible and the SIMATIC S7-300 CPU family. Source: Threadpost