Latest Intelligence for May 2016
Our latest intelligence reveals Angler responsible for over 51 percent of exploit kit attacks, and one email in every 134 is now malicious. Twitter Card Style: summary read more Source: Symantec
Read MoreOur latest intelligence reveals Angler responsible for over 51 percent of exploit kit attacks, and one email in every 134 is now malicious. Twitter Card Style: summary read more Source: Symantec
Read MorePUA downloaders are disguising themselves as torrents for pirated copies of Assassin’s Creed Syndicate and The Witcher 3 to install multiple different PUAs on users’ computers. Twitter Card Style: summary read more Source: Symantec
Read MoreIt’s often difficult for new users to realize the full potential of this powerful cloud-based productivity tool. David Gewirtz shares his Evernote tips and tricks. Source: DIY IT
Read MoreAndroid banking and ad-fraud Trojans leverage ideas found in GitHub-hosted open source projects and use the UsageStats API to bypass Android 5.0 and 6.0 security enhancements. Blog Feature Image: black_smartphone.jpg Twitter Card Style: summary read more Source: Symantec
Read MoreBank in Philippines was also targeted by attackers, whose malware shares code with tools used by Lazarus group. Twitter Card Style: summary Symantec has found evidence that a bank in the Philippines has also been attacked by the group that stole US$81 million from the Bangladesh central bank and attempted to steal over $1 million
Read MoreAndroid.Bankosy and Android.Cepsohord are capable of working with the new runtime permission model introduced in Android 6.0 Marshmallow. Twitter Card Style: summary read more Source: Symantec
Read MoreOver 2,500 Twitter accounts were compromised to post links to adult dating and sex personals. Blog Feature Image: hooded_keyboard.jpg Twitter Card Style: summary_large_image More than 2,500 Twitter accounts have been compromised to tweet links to websites specializing in adult dating and sex personals. The attackers also changed the profile photo, biography, and full name of
Read MoreOriginal release date: May 23, 2016 | Last revised: June 01, 2016 Systems Affected Windows, OS X, Linux systems, and web browsers with WPAD enabled Networks using unregistered or unreserved TLDs Overview Web Proxy Auto-Discovery (WPAD) Domain Name System (DNS) queries that are intended for resolution on private or enterprise DNS servers have been observed
Read MoreA worm is exploiting an old vulnerability to spread across Ubiquiti routers running outdated firmware. Blog Feature Image: ThinkstockPhotos-161906068.jpg Twitter Card Style: summary read more Source: Symantec
Read MoreSuckfly conducted long-term espionage campaigns against government and commercial organizations in India. Blog Feature Image: worldpoints_bluearc.jpg Twitter Card Style: summary read more Source: Symantec
Read MoreOriginal release date: May 11, 2016 Systems Affected Outdated or misconfigured SAP systems Overview At least 36 organizations worldwide are affected by an SAP vulnerability [1]. Security researchers from Onapsis discovered indicators of exploitation against these organizations’ SAP business applications. The observed indicators relate to the abuse of the Invoker Servlet, a built-in functionality in
Read MoreMicrosoft has patched an Internet Explorer zero-day vulnerability (CVE-2016-0189), which was exploited in targeted attacks in South Korea. Blog Feature Image: space.jpg Twitter Card Style: summary read more Source: Symantec
Read MoreThis month the vendor is releasing 16 bulletins, eight of which are rated Critical. Twitter Card Style: summary read more Source: Symantec
Read MoreOur latest intelligence reveals Nuclear exploit kit comprised 42 percent of all web attacks, and 71 percent of all social scams spread through manual sharing. Blog Feature Image: commandcenter.jpg Twitter Card Style: summary read more Source: Symantec
Read MoreMobile financial malware authors may borrow tricks from adware by using Android’s accessibility service to circumvent OS improvements. Twitter Card Style: summary read more Source: Symantec
Read MoreCompromised websites and spear-phishing emails used to infect targets with Daserf Trojan Blog Feature Image: globepoints.jpg Twitter Card Style: summary Contributor: Gavin O’Gorman read more Source: Symantec
Read MorePresidential primary apps can gather a lot of information and may expose sensitive data. Blog Feature Image: ThinkstockPhotos-476085510.jpg Twitter Card Style: summary Contributor: Shaun Aimoto read more Source: Symantec
Read MoreOriginal release date: April 14, 2016 Systems Affected Microsoft Windows with Apple QuickTime installed Overview According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1] Description All software products have a lifecycle. Apple will no longer be providing security updates for QuickTime
Read MoreThis month the vendor is releasing 13 bulletins, six of which are rated Critical. Blog Feature Image: patch.png Twitter Card Style: summary Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor is releasing 13 bulletins, six of which are rated Critical. read more Source: Symantec
Read MoreExploit kits (EKs) including Magnitude and Nuclear have begun to exploit a type confusion vulnerability in Adobe Flash Player (CVE-2016-1019). Blog Feature Image: exploit_skull.jpg Twitter Card Style: summary read more Source: Symantec
Read MoreThe Latest Intelligence for March 2016 reveals that the average number of mobile malware variants has reached 50 per family. Blog Feature Image: commandcenter.jpg Twitter Card Style: summary read more Source: Symantec
Read MorePatch due to be published this week for critical new Adobe Flash vulnerability CVE-2016-1019. Blog Feature Image: space.jpg Twitter Card Style: summary Adobe has said it will soon issue an update for Flash Player, following the discovery of a critical vulnerability that is being exploited in the wild. read more Source: Symantec
Read MoreA new crypto-ransomware variant may indicate a shift towards targeting businesses with malware that encrypts their files. Blog Feature Image: Screen Shot 2016-04-13 at 1.58.54 PM.png Twitter Card Style: summary read more Source: Symantec
Read MoreSymantec Security Response outlines tax-related scams that individuals and businesses should not fall for during each tax season. Blog Feature Image: Screen Shot 2016-04-13 at 2.05.43 PM.png Twitter Card Style: summary read more Source: Symantec
Read MoreOriginal release date: March 31, 2016 | Last revised: May 06, 2016 Systems Affected Networked Systems Overview In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare facilities and hospitals worldwide. Ransomware is a type of malicious software that infects a computer
Read More