Security News > 2020 > September

Google has deleted six apps from its Google Play marketplace that were infecting users with the Joker malware. As of Wednesday, Google confirmed with Threatpost that all infected applications have been removed from Google Play, but researchers said that they are still installed on the devices of their users, and urged users to immediately delete the apps.

Instead of trying to remember a long and complex password, try switching to passphrases. You should be cautious about using passphrases based on commonly known things about you.

Learn how you can enable the new Nextcloud end-to-end encryption. What you'll need How to enable encryption on Nextcloud.

As organizations try to defend themselves against external threats, they need to remember that insider threats can also cause harm. A report released Wednesday by security provider Bitglass shines a light on the ramifications of insider threats and offers advice on how to use the right security features to combat them.

The Sharepoint link you're expected to click to access the One Note file does look suspicious because there's no clear connection between the sender's company and the location of the One Note lure. It's only at this stage that the crooks present their call-to-action link - the click that they didn't want to put directly ino the original email, where it would have stood out more obviously as a phishing scam.

A new report finds that 33% of companies within the digital supply chain expose common network services such as data storage, remote access, and network administration to the internet. Admins should either eliminate direct internet access or deploy compensating controls for when/if such services are required, according to the report by RiskRecon, a Mastercard company, and the cybersecurity research services firm Cyentia Institute.

Anyone paying attention to the cybersecurity technology market has heard the term XDR - Extended Detection and Response. Why is XDR receiving all the buzz? Combining security technologies in a usable manner has become the bane of cybersecurity as technology spread has overwhelmed the space.

Rew Little said in an interview with The Associated Press on Wednesday that tracking down the perpetrators of the attacks in recent weeks would be extremely difficult, as the distributed denial of service attacks are being routed through thousands of computers. One line of investigation is the emails sent to people in some of the targeted organizations demanding a ransom in exchange for stopping the attacks, Little said.

Cisco Systems says hackers are actively exploiting previously unpatched vulnerabilities in its carrier-grade routers that could allow adversaries to crash or severely disrupt devices. The vulnerabilities exist in the Distance Vector Multicast Routing Protocol feature of Cisco IOS XR Software and could allow an unauthenticated, remote attacker to immediately crash the Internet Group Management Protocol process, the company warned in an advisory over the weekend.

Malware pathologists have noted a return to "Business as usual" as groups associated with Chinese state interests turned their attentions back to Tibetan matters after a European dalliance earlier this year. Back in March, a phishing campaign attempted to deliver the "Sepulcher" malware to various European institutions with a sender email identified as being linked to historical Chinese APT targeting of the Tibetan community, Proofpoint said.