Security News > 2021
A massive malicious spam campaign, along with the global takedown of Emotet, has vaulted the TrickBot trojan to the top of the Check Point's list of the most popular malware among cybercriminals for February. In January, TrickBot was ranked third on Check Point's list, and it was fourth overall for 2020, while the No. 1 malware, Emotet, remained ascendant.
Once you have AlmaLinux up and running, one of the first things you should do is set up two-factor authentication for SSH. After all, you don't want to rely solely on SSH for authentication to your servers-not in today's world. How to install the google-authenticator command on AlmaLinux.
Mozilla today started rolling out Firefox 86.0.1 to address a known bug causing the web browser to crash frequently when launched on Linux systems. While this issue came with a low crash rate on previous Firefox versions, Linux users have started seeing more and more crashes after updating to Firefox 86 last month.
The wave of big-name companies falling victim to disruptive malware attacks is showing no signs of slowing down with beverage conglomerate Molson Coors Beverage Company announcing on Thursday that it was recovering from an incident that severely disrupted its production operations. The company's disclosure of the incident, believed to be a ransomware infection, was contained in an 8K filing with the Securities and Exchange Commission that discusses an "a systems outage that was caused by a cybersecurity incident."
In theory, many exploitable IDOR bugs can be found purely analytically, by reverse engineering the suspect app, without ever actually creating a fake account and running the app itself. There's no need to spend days analysing an app statically in a decompiler if you can deduce its bugs directly from its own behaviour - you simply give the app a chance to cook its own cybersecurity goose while you take notes.
It was only a matter of time before cybercriminals turned their attention to one of the most common activities on the internet- a Google search. The latest trick is using long-tail search terms and legitimate websites to deliver the Gootkit remote access trojan.
That's according to researchers at Trustwave, who found that the campaign is effectively hiding a malicious executable by giving it a.ZIPX file extension, which is used to denote that a.ZIP archive format is compressed using the WinZip archiver. In reality, the appended file is an Icon image file wrapped inside a.RAR package.
Today, researchers have exposed common weaknesses lurking in the latest smart sex toys that can be exploited by attackers. In examples provided by the researchers, technologies like Bluetooth and inadequately secured remote APIs make these IoT personal devices vulnerable to attacks that go beyond just compromising user privacy.
Today, researchers have exposed common weaknesses lurking in the latest smart sex toys that can be exploited by attackers. In examples provided by the researchers, technologies like Bluetooth and inadequately secured remote APIs make these IoT personal devices vulnerable to attacks that go beyond just compromising user privacy.
The Molson Coors Beverage Company has suffered a cyberattack that is causing significant disruption to business operations. Molson Coors is well-known for its iconic beer brands, including Coors Light, Miller Lite, Molson Canadian, Blue Moon, Peroni, Killian's, and Foster's.