Security News > 2017 > June

Crowdfunding Effort to Buy ShadowBrokers Exploits Shuts Down (Threatpost)
2017-06-01 16:38

A crowdfunding effort to buy a subscription to the ShadowBrokers' Monthly Dump Service of stolen exploits and data was shut down citing legal and ethical concerns.

OneLogin Breach Compromised Customer Data, Ability to Decrypt Encrypted Data (Threatpost)
2017-06-01 16:29

A breach at OneLogin appears to have compromised customer data, including the ability to decrypt encrypted data.

Passwords at the Border (Schneier on Security)
2017-06-01 15:59

The password-manager 1Password has just implemented a travel mode that tries to protect users while crossing borders. It doesn't make much sense. To enable it, you have to create a list of...

Intelligence data, security credentials found exposed in the Amazon cloud (Help Net Security)
2017-06-01 15:41

A data cache containing highly sensitive US military data has inadvertently been exposed online, UpGuard cyber risk analyst Chris Vickery has discovered last week. After downloading and analyzing...

Crowdfunding for Acquiring Shadow Brokers Exploits Canceled (Security Week)
2017-06-01 15:16

Researchers announced this week the launch of a crowdfunding initiative whose goal was to raise money to subscribe to the Shadow Brokers’ monthly exploit leaks. However, the funding campaign has...

Hackers hosted tools on a Stanford University website for months (Help Net Security)
2017-06-01 15:00

Compromising legitimate websites and the web servers that store and deliver them is a time-honoured tactic of opportunistic hackers, and a failure to keep them out can result in the servers...

Ready or not, IoT third party risks are here (Help Net Security)
2017-06-01 14:30

A new survey conducted by The Ponemon Institute uncovered a high rate of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate and communicate the...

WannaCry Development Errors Enable File Recovery
2017-06-01 14:09

Researchers at Kaspersky Lab have found a number of programming errors in the WannaCry ransomware code that put file recovery within reach of sysadmins.

Decoy Files Found in PDFs Dropping Jaff Ransomware
2017-06-01 13:37

Spam campaigns distributing the Jaff ransomware have evolved and are using multiple decoy files hidden inside malicious PDF attachments, Trustwave security researchers say. read more