Exim suffers another ‘critical’ remote code execution flaw

Credit to Author: John E Dunn| Date: Wed, 02 Oct 2019 12:28:02 +0000

This latest Exim flaw could lead to at least a denial of service crash in the software but also the possibility of remote code execution.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/MxuCX_Qs0nA” height=”1″ width=”1″ alt=””/>

Read more

O.MG! Evil Lightning cable about to hit mass distribution

Credit to Author: Danny Bradbury| Date: Wed, 02 Oct 2019 12:27:19 +0000

This malicious O.MG Lightning cable has come a long way, with extensive work on the kinds of payload it can deliver.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/P7a9UkBNKp0″ height=”1″ width=”1″ alt=””/>

Read more

218 million Words With Friends players lose data to hackers

Credit to Author: Lisa Vaas| Date: Wed, 02 Oct 2019 12:20:10 +0000

The serial hacker GnosticPlayers is claiming to have ransacked Zynga’s user data – including names, emails and passwords.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/5iXJ4_o_gJ4″ height=”1″ width=”1″ alt=””/>

Read more

Ex-Yahoo engineer pleads guilty to hacking 6,000 accounts

Credit to Author: Lisa Vaas| Date: Wed, 02 Oct 2019 10:41:17 +0000

Reyes Daniel Ruiz went after younger women’s accounts, including those of his personal friends and work colleagues, he admitted.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/aH0yMJKQHEU” height=”1″ width=”1″ alt=””/>

Read more

Lemon_Duck PowerShell malware cryptojacks enterprise networks

Credit to Author: rajeshnataraj| Date: Tue, 01 Oct 2019 04:01:09 +0000

SophosLabs are monitoring a significant spike in crypto mining attacks, which spread quickly across enterprise networks. Starting from a single infection, these attacks use a variety of malicious scripts that, eventually, turn an enterprise&#8217;s large pool of CPU resources into efficient cryptocurrency mining slaves. The threat actors behind these campaigns have been using an array [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jF91Bgk0dso” height=”1″ width=”1″ alt=””/>

Read more

Cloudflare adds VPN features to 1.1.1.1 privacy app

Credit to Author: John E Dunn| Date: Tue, 01 Oct 2019 13:07:47 +0000

As promised in April, Cloudflare has finally launched Warp, a consumer mobile privacy app that looks a lot like a VPN without actually being one.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/IXc1HLdLZ1Y” height=”1″ width=”1″ alt=””/>

Read more

Sophos launches Managed Threat Response service

Credit to Author: Eric Kokonas| Date: Tue, 01 Oct 2019 12:55:02 +0000

We&#8217;re very excited to extend our customers’ protection against the most advanced threats with the launch of our new service: Sophos Managed Threat Response (MTR). The resellable service provides organizations with a dedicated 24/7 security team to neutralize the most sophisticated and complex threats. Few organizations have the right tools, people, and processes in-house to [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/IjFoUSJO2VU” height=”1″ width=”1″ alt=””/>

Read more

Hacking 2020 voting systems is a ‘piece of cake’

Credit to Author: Lisa Vaas| Date: Tue, 01 Oct 2019 11:31:59 +0000

That’s how Senator Wyden described the results of DefCon’s Voting Village, where all of 100 voting systems were easily picked apart by hackers.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/buAZK9dzyQA” height=”1″ width=”1″ alt=””/>

Read more

China’s 500 megapixel camera is capable of mega-facial-recognition

Credit to Author: Danny Bradbury| Date: Tue, 01 Oct 2019 10:31:34 +0000

The ‘super camera’ can identifying people dozens of meters away using facial recognition.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/GeYEe_eqh_k” height=”1″ width=”1″ alt=””/>

Read more

Darknet hosting provider in underground NATO bunker busted

Credit to Author: Lisa Vaas| Date: Tue, 01 Oct 2019 09:41:45 +0000

Police overcame not only digital defenses of the “bulletproof” provider CyberBunker but also barbed wire fences and surveillance cams.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/mdF0Y34b2RU” height=”1″ width=”1″ alt=””/>

Read more