Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, in which cybercriminals fake letters from WHO, impersonate its CEOs Tedros Adan Gebreisus, and send users emails containing a HawkEye keylogger. HawkEye is a credential theft program that is usually distributed through fraudulent emails and malicious Microsoft Word, Excel, PowerPoint, and RTF files. “After installing on… Continue reading Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Firefox Refuses to Support FTP Protocol

ZDNet reports that Mozilla developers consider FTP to be an insecure protocol and will soon refuse to support it in Firefox. Therefore, users will no longer be able to upload files via FTP, and may not be able to view the contents of FTP links and folders in a browser. “We do this for security… Continue reading Firefox Refuses to Support FTP Protocol

Ransomware attacks most often occur at night and on weekends

According to a report published by the American company FireEye, 76% of all ransomware attacks in the corporate sector occur in the off-hours: 49% of them are recorded at night on weekdays, and another 27% at weekends. This data is based on dozens of ransomware incident investigations from 2017 to 2019. “In 76% of incidents… Continue reading Ransomware attacks most often occur at night and on weekends

Snoop attack steals data from Intel processors

Amazon Web Services (AWS) software engineer Pawel Wieczorkiewicz discovered another vulnerability in Intel processors that allows stealing data from the internal memory of the CPU. Discovered by Wieczorkiewicz attack was called Snoop-assisted L1 Data Sampling or simply Snoop. Last week, Intel and AMD equalized number of discovered vulnerabilities, but as we will see right now,… Continue reading Snoop attack steals data from Intel processors

Microsoft stopped RDCMan development due to a bug

Microsoft has stopped development of the Remote Desktop Connection Manager (RDCMan) application after it has been identified as vulnerability. As the name suggests, this application allows remotely connecting to other Windows computers through RDP. Windows Live Experience team developed it for the internal use, but since the late 2000s it has become available to everyone… Continue reading Microsoft stopped RDCMan development due to a bug

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as the most vulnerable OS over the past year), called Cookiethief and Youzicheng. They are can steal cookies stored in browsers on smartphones and in applications of popular social networks, in particular Facebook. How can cookie theft be dangerous? Web services with their help “store” on… Continue reading Two new malware can steal cookies from Android apps

Modern RAM is still vulnerable to Rowhammer attacks

Recently, I wrote all about the vulnerabilities of Intel and AMD processors, and in the meantime, a group of researchers from universities in the Netherlands and Switzerland published a report according to which modern RAM memory is vulnerable to Rowhammer attacks, despite all the protective measures taken by manufacturers over the past six years. A… Continue reading Modern RAM is still vulnerable to Rowhammer attacks

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called Load Value Injection (LVI). This claim is not an attempt to to balance yesterday’s news about vulnerabilities in the processors of Intel’s rival AMD. Indeed, the news came one after another. A team of scientists from the Worcester Polytechnic Institute, Graz Technical University, the University… Continue reading Intel processors need hardware fixes due to new LVI attack

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for Scientific Research of France and the Graz Technical University published a report on new attack vectors for AMD processors. Researchers said AMD processors are vulnerable to two attacks. These problems, discovered by experts back in 2019, affect the security of data processed by processors and… Continue reading Information security experts said that AMD processors are vulnerable to two attacks

More than 40% of Android users are at risk of cyberattacks

According to a study by Which company, more than 40% of active Android users around the world use OS version 6.0 or earlier. Therefore, they will not receive security updates and are at risk of cyberattacks. One of the main complaints about the Android mobile operating system has always been related to the lack of… Continue reading More than 40% of Android users are at risk of cyberattacks