[email protected] +603-2181 3666
Extol Threat Intelligent Notification

The security firm Intezer reported it had successfully shut down 15 active ransomware campaigns using the eCh0raix or QNAPCrypt variant with denial of service attacks. NAS servers normally store large amounts of important data and files, which make them a valuable target for attackers and especially a viable target for ransomware campaigns. In a rare […]

In a rare occurrence, the American National Security Agency (NSA) has published a statement urging people to update their older Windows systems to protect against the BlueKeep vulnerability. The NSA referenced “growing threats” and noted that BlueKeep “is the type of vulnerability that malicious cyber actors frequently exploit through the use of software code that […]

Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE. In an unusual progression of events, the vulnerability and exploits have been disclosed before patches are available. The vulnerability, designated CVE-2018-15664, was discovered by researcher Aleka Sarai. A flaw in the Docker “cp” command, which […]

The NamPoHyu ransomware is doing things differently by searching for accessible Samba servers, brute forcing the passwords, and then remotely encrypting their files and creating ransom notes. A ransomware family was recently spotted targeting vulnerable Samba servers: NamPoHyu Virus aka MegaLocker Virus. NamPoHyu Virus is unlike typical ransomware families that are delivered locally and launched as executables. Instead, […]

At least 27 universities in the United States, Canada and countries in the Southeast Asian region was reportedly targeted by Chinese hackers looking for information relating to the maritime military technologies to steal. An article from the Wall Street Journal revels that a substantial list of university targets that reflects an elaborate scheme, dates back […]

Let’s Encrypt certificates can now stand on their own for almost all newer versions of operating systems, browsers and devices. Microsoft has added direct trust for Let’s Encrypt certificates, meaning that all major browsers and operating systems, including Apple, Blackberry, Google, Microsoft, Mozilla and Oracle, now all directly trust the Let’s Encrypt root, ISRG Root […]

The new strategy allows an attacker to instead lift ID information directly from the router, within minutes. Legacy Wi-Fi just became a little less safe: According to Jens Steube, the developer of the password-cracking tool known as Hashcat, has found a faster, easier way to crack WPA/WPA2-protected Wi-Fi networks. Hackers have compromised the WPA/WPA2 encryption […]

Half of breached firms say they were compromised due to a vulnerability for which a patch was available but not applied. Almost half (45 percent) of financial services firms in a recent survey have reported a data breach in the last two years – with many of those attacks being completely avoidable if known vulnerabilities […]

A massive proxy botnet is just the tip of the iceberg, a warning sign of a bigger operation in the works by the Ramnit operators. The recently uncovered “Black” botnet campaign using the Ramnit malware racked up 100,000 infections in the two months through July– but the offensive could just be a precursor to a […]

1 2 3 156