#Google is under fire after a report found that Google Home and Google Assistant records user audio, even when no wake-up word is used.
Threatpost
@threatpost
Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.
Threatpost’s posts
A white hat hacker reverse engineered 30 mobile financial applications and found sensitive #data buried in the underlying #code of nearly all apps examined.
threatpost.com/financial-apps
In in lieu of a patch... “I advise to IMMEDIATELY DISCONNECT vulnerable routers from the Internet.” bit.ly/2jhkqY6
Breaking: Hundreds of millions of #Facebook records – including account names and plaintext #passwords – have been found in two separate publicly-exposed app datasets, researchers at found.
Secure password firms (1Password, Dashlane, KeePass and LastPass) are blasting a #security report highlighting how the utilities can be cracked open to steal #passwords.
Two separate attacks have targeted as many as 50,000 different #Teams users, with the goal of phishing #Microsoft Office 365 logins.
This Office 365 #phishing attack leverages real-time Active Directory validation of credentials. #Office365
15 billion usernames and #passwords are currently for sale on underground forums - over three times the number available two years ago. (via @digitalshadows)
A highly targeted phishing attack, abusing #Microsoft Sway, has successfully compromised the #Office365 credentials of more than 150 executives.
A strange glitch in #Gmail can be exploited to place emails into a person’s “Sent” folder — even if that person never sent them.
A U.S. military nuclear contractor was hit with the Maze #ransomware - and cybercriminals have started to leak its documents online. #ICYMI
"Basically, everything was pwned, from the LAN to the WAN." - bit.ly/2jhkqY6
A “critical water utility” in a county crippled by Hurricane #Florence was hit by a #ransomware attack.
The #cyberattack has significantly impeded its ability to provide service to residents impacted by the #hurricane.
It’s not just ’s peripherals that gobble up #Windows10’s SYSTEM privileges: A #vulnerability also tosses off #Win10 admin rights if you just plug in a device or use an #LPE script to imitate a human interface. via
#cybersecurity
A new hack, called PDFex, allows attackers to break the #encryption of PDF files and access content or forge signed #PDF files.
. theorizes RATs becoming popular w/ campaign because more flexible than single-purpose ransomware:
A monster #cyberattack on #SITA, a global IT provider for 90% of the world’s airline industry, is slowly unfurling to reveal the largest #SupplyChain attack on the #airline industry in history. #cybersecurity threatpost.com/supply-chain-a
Hackers are still using #Metasploit and a highly effective technique called Shikata Ga Nai to slip past modern day endpoint protections, said @FireEye researchers.
Hackers broke into #Microsoft’s GitHub account and stole 500 GB of data from its private repositories, according to reports.
Top 2020 #security predictions:
-Mobile will become a prime phishing attack vector
-Hackers will increasingly employ machine learning in attacks
-Cloud increasingly seen as fertile ground for compromise
Add your own 2020 predictions in the comments ⤵️
The open-source Virtual Network Computing (VNC) project, often found in industrial environments, is plagued with 37 different memory-corruption #security vulnerabilities.
A former analyst for the U.S. Defense Intelligence Agency was sentenced to 2+ years in prison after sharing highly classified, national defense intelligence with two reporters.
A U.S. court ruled that the #NSA mass #surveillance program was illegal – seven years after it was exposed by Snowden.
Multiple zero-days in a Counter-Strike client were used to build a major #botnet - and almost 40 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.
The Maze #ransomware has hit a U.S. military contractor involved in the maintenance of the country’s Minuteman III #nuclear arsenal.
The entire population of #Ecuador has been impacted by an open database on an unsecured server. Exposed data includes:
-Full name
-Date and place of birth
-Home address
-Cell phone numbers/emails
-Taxpayer IDs
-Marital status
(Via )
A fake #Adobe update actually updates victims’ Flash Player – but also installs malicious #cryptomining malware.
Researchers at warned that the fake updates also borrow pop-up notifications from the official Adobe installer.
threatpost.com/stealthy-fake-
A memory-corruption bug in #Microsoft Exchange allows remote #code execution - just by sending an email to a target.
The operators of Shade #ransomware called it quits, releasing 750,000 encryption keys on GitHub and publicly apologizing to victims affected by the malware.
Yet another side-channel attack was discovered in CPUs.
A glitch in the simultaneous multithreading (SMT) process in #CPUs - including #Intel chips - allows #hackers to siphon processed data. #PortSmash
Trojans, backdoors and droppers are the top three #malware types being analyzed by threat intelligence teams.
"The problem is this green lock... It means the connection is encrypted, not that the content of the site is safe.” bit.ly/2rotZrI
A new variant of the #Mirai IoT botnet is targeting wireless presentation systems and LG display systems used by enterprises.
threatpost.com/mirai-enterpri
A series of #hacks against ATM terminals across Europe are forcing the machines to dispense cash to crooks.
#Microsoft quietly pushed out an emergency update to fix critical and important-severity RCE flaws in #Windows Codecs Library.
Researchers are urging #Ring users to update to the latest version of the smart doorbell after a serious flaw triggered #privacy concerns.
threatpost.com/ring-doorbell-
The recently discovered #Windows zero-day – which still doesn’t have a patch – has been used in the wild for the last week:
Unencrypted mobile traffic on #Tor network is leaking personal identifiable information, researchers say. That includes GPS coordinates, web addresses, phone numbers and keystrokes.
Gamer alert! bugs allow privilege-escalation attacks, arbitrary code execution, denial of service (DoS) and information disclosure-- YIKES bit.ly/3u73aFe #patchoftheday #CyberSecurity
Researchers are warning of a convincing #cyberattack that impersonates notifications from #Microsoft Teams in order to steal employee Office 365 credentials.
A new #hacking technique used against vulnerable #MikroTik routers gives attackers the ability to execute remote code on affected devices.
Researchers outlined the attack at #DerbyCon2018.
threatpost.com/poc-attack-esc
New: #Intel has disclosed a new class of speculative execution attacks impacting all of its modern CPUs.
More than 2 million #IoT devices have serious vulnerabilities that have been publicly disclosed for more than two months – yet they are still without a patch or even any vendor response.
A high-severity flaw was discovered in a #WordPress plugin installed on more than 100,000 sites.
The vulnerability could lead to XSS and the injection of malicious #JavaScript anywhere on a victim's site.
The University of Utah paid a $457,000 ransom after a #ransomware attack hit the university’s servers.
More than 2 million #passwords for Wi-Fi hotspots were leaked online by the #Android app developer behind the mobile application called WiFi Finder.
The first-stage Golang malware loader, spotted in active campaigns, has added additional exploits and a new backdoor capability.
Researchers are warning of a dangerous spearphishing campaign, which has targeted 17 U.S. utility companies with a new #malware variant.
The malware, which calls LookBack, has capabilities to view system data and reboot machines.
An insidious #phishing method evades detection using a never-before-seen technique that leverages custom fonts, according to researchers.
threatpost.com/phishing-custo
A database on #Apple’s macOS computers is storing emails, that are supposed to be protected with encryption, as readable files.
It's a problem that the company has been aware for months - and still has yet to solve.
Threat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job.
A critical Zoom #vulnerability allows remote #hackers to hijack conference meetings and kick attendees out.
Researchers at disclosed the unauthorized command execution flaw today.
Less than 500 machines have been patched since issued an alert to fix a critical F5 BIG-IP #security bug that’s under active exploit.
