Pages:
Author

Topic: [ANN][ICO] HEROIC.com 🚀Decentralized Cybersecurity Powered by AI [PRESALE LIVE] - page 2. (Read 28455 times)

sr. member
Activity: 1680
Merit: 278
Ransomware attack hits Cleveland Airport crippling email services and information screens
What is the issue - On April 22, 2019, a ransomware attack hit Cleveland Hopkins Internation Airport disabling information screens that display in-airport flight arrivals, departures and baggage claims.
Why it matters - The attack halted the services for days and the FBI is investigating the incident in order to determine the source of the attack and to restore the services back to normal operations. However, as of yesterday (April 25, 2019), the services still remain paralyzed.

https://cyware.com/news/ransomware-attack-hits-cleveland-airport-crippling-email-services-and-information-screens-3666699e

sr. member
Activity: 1680
Merit: 278
Old Vulnerabilities Are Still Good Tricks for Today's Attacks

The value of a security vulnerability drops significantly the moment it gets patched but the bad guys will keep exploiting it for as long as they can find victims that are worth the effort.
According to a report today, the most exploited security bugs in the first quarter of 2019 were well-known, old problems, some of them patched almost a decade ago.
Statistics and research from Fidelis Cybersecurity show that about a third of the alerts recorded by the company were for exploits, vulnerabilities, and malware that emerged in 2017 and earlier.

https://www.bleepingcomputer.com/news/security/old-vulnerabilities-are-still-good-tricks-for-todays-attacks/

sr. member
Activity: 1680
Merit: 278
Drive-by download attack leveraged to deliver LoadPCBanker trojan through Google Sites

The malware is used against victims who speak Portuguese or English.
The attack begins with victims receiving phishing emails about a hotel reservation or confirmation.
Cybercriminals are deploying a banking trojan using the file cabinet template built into the Google Sites platform. The malware, dubbed as LoadPCBanker, is used against victims who speak Portuguese or English.

https://cyware.com/news/drive-by-download-attack-leveraged-to-deliver-loadpcbanker-trojan-through-google-sites-9347161e

sr. member
Activity: 1680
Merit: 278
Malicious attachment disguised as top-secret US document leveraged to target organizations in Europe:
The campaign is used against several financial service firms and embassies in Europe.
The infection process starts with attackers sending phishing emails to the targets.


sr. member
Activity: 1680
Merit: 278
Zero-day XML External Entity Injection vulnerability found impacting Microsoft Internet Explorer

The flaw can enable an attacker to steal confidential information or exfiltrate local files from the victim’s machine.
XXE injection works if a user opens a specially crafted .MHT file.

https://cyware.com/news/zero-day-xml-external-entity-injection-vulnerability-found-impacting-microsoft-internet-explorer-07d6e3c2

sr. member
Activity: 1680
Merit: 278

Eight unsecured databases found leaking nearly 60 million LinkedIn users' information

linkedin, imac, people, background, desktop, table, business, mac, digital, gray, editorial, technology, touch, computer, computing, mobile, linked, device, online, man, screen, search, network, friends, display, pad, interface, illustrative, internet, partnership, social, iphone6, gadget, contact, company, discussion, apple, information, blog, space, chat, message, office, hand, communication
The total size of databases is estimated to be 229 GB.
As of April 15, 2019, the databases were secured and are no longer accessible on the internet.
Eight misconfigured databases have been found leaking approximately 60 million records of LinkedIn user information. The total size of databases is estimated to be 229 GB, with each database ranging between 25 GB and 32 GB.

https://cyware.com/news/eight-unsecured-databases-found-leaking-nearly-60-million-linkedin-users-information-181c7e45

sr. member
Activity: 1680
Merit: 278
New Phishing scam called ‘The Hotlist’ now targets the Instagram users

The new scam operates in a similar manner as the recent ‘The Nasty List’ scam.
The scam begins with Instagram users receiving a message regarding a list of their ‘hot’ photos on Instagram.

https://cyware.com/news/new-phishing-scam-called-the-hotlist-now-targets-the-instagram-users-4e10b4e6

sr. member
Activity: 1680
Merit: 278
After FBI agents, hackers now release personal information of AAF members

In the last week, the hacker group who goes by the name of ‘PokemonGo Team’ had uploaded the personal information of several Federal agents.
The hackers could have exploited a flaw in the third-party software used by the websites associated with the FBINAA in order to steal the data.

https://cyware.com/news/after-fbi-agents-hackers-now-release-personal-information-of-aaf-members-49eae921

sr. member
Activity: 1680
Merit: 278
‘Gnosticplayers’ hacker returns with fifth dataset containing over 65 million user accounts for sale

The latest batch of stolen users’ records belongs to six new companies.
The hacked data is being sold for 0.8463 Bitcoin ($4,350) on the DreamMarket forum.
‘Gnosticplayers’ hacker is back with the fifth round of stolen data. This time, he has put up over 65 million user accounts on sale on the dark web forum.


https://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99

sr. member
Activity: 1680
Merit: 278


New miner malware leverages variety of propagation techniques to infect Windows systems
A malware detected as Trojan.PS1.LUDICROUZ.A uses several propagation methods to gain access to systems.
The malware uses the EternalBlue exploit kit and obfuscated PowerShell scripts to evade detection and spread silently across the network.
Threat actors have been found using a new miner malware to infect users in Australia, Taiwan, Vietnam, Hong Kong, India, and China. The malware leverages multiple methods for propagation and infection, to infect Windows systems and drop a Monero mining malware.

https://cyware.com/news/new-miner-malware-leverages-variety-of-propagation-techniques-to-infect-windows-systems-d0060543

sr. member
Activity: 1680
Merit: 278

Attackers compromised the VSDC website and embedded a malicious JavaScript code inside the website.
Doctor Web researchers revealed that at least 565 users who downloaded VSDC editor had their computers infected with the Win32.Bolik.2 banking Trojan.
What is the issue - Doctor Web researchers identified that attackers compromised the website of free multimedia editor VSDC and hijacked the website’s download links to distribute a banking trojan Win32.Bolik.2 and an info stealer malware Trojan.PWS.Stealer (KPOT stealer).

https://cyware.com/news/vsdc-website-gets-infected-with-a-banking-trojan-and-an-info-stealer-ab16693a

sr. member
Activity: 1680
Merit: 278
Microsoft has started notifying some Outlook.com users that a hacker was able to access accounts for months earlier this year. The software giant discovered that a support agent’s credentials were compromised for its web mail service, allowing unauthorized access to some accounts between January 1st and March 28th, 2019. Microsoft says the hackers could have viewed account email addresses, folder names, and subject lines of emails, but not the content of emails or attachments.

https://www.theverge.com/2019/4/13/18309192/microsoft-outlook-email-account-hack-breach-security

sr. member
Activity: 1680
Merit: 278
While Heroic's solution isnt deployed in order to be safe form attacks.. we need harder regulation!
The UK man had reportedly targeted hundreds of millions of computers with Reveton ransomware.
It is estimated that he received more than $915,000 from the ransom payments.
The National Criminal Agency (NCA) has sentenced Zain Qaiser to six years of imprisonment for his involvement in Reveton ransomware attacks. The 24-year-old computer science student from Barking, London, was part of a Russian crime group that had perpetrated this attack in more than 20 countries.
https://cyware.com/news/reveton-ransomware-distributor-faces-jail-time-of-six-years-0872953c

sr. member
Activity: 1680
Merit: 278

Genesis cybercrime market sells digital fingerprints of over 60000 people
What is the issue - At the Kaspersky Security Analyst Summit conference, Kaspersky Lab researchers have revealed that they have uncovered a new cybercrime marketplace named ‘Genesis’ where cybercriminals are selling full digital fingerprints for over 60,000 users.

https://cyware.com/news/genesis-cybercrime-market-sells-digital-fingerprints-of-over-60000-people-03a49083

sr. member
Activity: 1680
Merit: 278
Xiaomi's pre-installed security app Guard Provider exposes users to MitM attacks

The vulnerability is due to insecure network traffic to and from Guard Provider and the use of multiple SDKs.
Increased use of multiple SDKs within the same app could cause problems such as crashes, viruses, malware, privacy breaches, battery drain, slowdown, and more.

https://cyware.com/news/xiaomis-pre-installed-security-app-guard-provider-exposes-users-to-mitm-attacks-87c514f6

sr. member
Activity: 1680
Merit: 278

German pharmaceutical company Bayer targeted by Winnti hacking group
The pharmaceutical company has identified, analyzed, and cleaned up the affected systems.
The drugmaker revealed that it discovered the infectious software on its network in 2018 but decided to monitor and analyze the threat instead of removing it.
What is the issue - German pharmaceutical giant Bayer disclosed that it was targeted by a cyber attack from a Chinese hacking group.


https://cyware.com/news/german-pharmaceutical-company-bayer-targeted-by-winnti-hacking-group-8e24c4c2

member
Activity: 1092
Merit: 29
'Free as a bird'
This is a very long project but I don't see what the ICO is, how much money has it been collected or are they still not starting ico? and for bounty I see also there is no certainty
Yes, I always waiting for the great news of this project before but nothing, try to see social media page, they didn't update posts about the progress of their project since long time, just share news from other. So I guess, bounty hunter must forget this project and don't hope it.
sr. member
Activity: 1680
Merit: 278
A growing number of cyber-attacks on key installations have successfully put systems out of action over the past two years, a study has revealed.

https://www.bbc.com/news/technology-47812479

sr. member
Activity: 1680
Merit: 278
Hackers breached Toyota’s IT systems and gained unauthorized access to servers that contained sales information of almost 3.1 customers.
The accessed data belongs to several sales subsidiaries such as Toyota Tokyo Sales Holdings, Tokyo Tokyo Motor, Tokyo Toyopet, Toyota Tokyo Corolla, Nets Toyota Tokyo, Lexus Koishikawa Sales, Jamil Shoji (Lexus Nerima), and Toyota West Tokyo Corolla.

https://cyware.com/news/toyota-suffered-a-data-breach-compromising-sales-information-of-almost-31-million-customers-1d753939

sr. member
Activity: 1680
Merit: 278
Steganography is a technique that enables hackers to hide malicious payloads or malware within a file, message, image or video.
The malicious content or text is usually encrypted before it is embedded within the files.
Cybercriminals are fond of using existing attack techniques in new ways to launch cyber attacks. It is much cheaper to tweak the technique rather than invent something new. One such example is that of steganography. Security researchers have observed that the attackers are heavily relying on this old-school trick to launch more advanced and sophisticated campaigns.

https://cyware.com/news/steganography-a-close-view-of-the-traditional-attack-technique-that-has-created-chaos-in-the-cybersecurity-world-d412d190

Pages:
Jump to: