IBM experts published an annual threat analysis, the IBM X-Force Threat Intelligence Index 2020, which demonstrates changes in cybercriminal methods over the past year and names the brands that are most often used for phishing...
Author - Emma Davis
RobbinHood Ransomware installs vulnerable Gigabyte drivers on victims’ computers
Experts from the British company Sophos talked about an interesting tactic that RobbinHood ransomware operators use. To disable security solutions, RobbinHood installs vulnerable Gigabyte drivers on target machines. According to...
Cybercriminals infect Android devices with Anubis banking trojan
Cybercriminals organized a phishing campaign aimed at users of Android devices, during which they infect smartphones and tablets with the Anubis banking trojan. The malware is able to steal financial information from more than...
Hackers used the Bitbucket service for distribution of malware
Cybereason company specialists discovered that hackers used the Bitbucket service to host and distribute several types of malware. have found seven species of malware involved in the campaign, which is still active. According to...
EmoCheck utility will detect Emotet infection
The Bleeping Computer publication noted that the developers of the Japanese CERT have created a special tool, the EmoCheck utility, which will allow Windows users to detect infection by the Emotet malware. that Emotet is...
Attackers used Twitter API to match phones to usernames
Twitter reported about an unpleasant incident: attackers used Twitter API to match users’ phone numbers with their names. The company’s specialists became aware of the abuses on December 24, 2019. During our...
Cyberattack on UN was implemented through SharePoint vulnerability
According to a confidential report, dozens of servers were compromised in the cyberattack on the UN through famous vulnerability in SharePoint. Wednesday, January 29, UN officials reported that in the middle of last year, the...
Cryptographer Ryuk attacked US Department of Defense contractor
ZDNet reports that Ryuk ransomware attacked a well-known government contractor of US Department of Defense, Electronic Warfare Associates (EWA), which manufactures electronics. Apparently, the attack was successful. to...
Avast closes its subsidiary Jumpshot company
Earlier this week, Vice Motherboard and PCMag published the results of their investigation and talked about how Avast collects and sells user data to the third party through its subsidiary Jumpshot. Now Avast closes Jumpshot...
Information security experts introduced exploits for fresh bugs in Windows RDG
As part of the first “update Tuesday” this year, Microsoft specialists fixed two critical vulnerabilities that affect Windows Server 2012, 2016 and 2019: CVE-2020-0609 and CVE-2020-0610. However, information security specialists...
