Security News

VMware fixes three critical auth bypass bugs in remote access tool
2022-11-08 20:24

VMware has released security updates to address three critical severity vulnerabilities in the Workspace ONE Assist solution that enable remote attackers to bypass authentication and elevate privileges to admin. Workspace ONE Assist provides remote control, screen sharing, file system management, and remote command execution to help desk and IT staff remotely access and troubleshoot devices in real time from the Workspace ONE console.

BPFdoor: Stealthy Linux malware bypasses firewalls for remote access
2022-05-12 17:07

A recently discovered backdoor malware called BPFdoor has been stealthily targeting Linux and Solaris systems without being noticed for more than five years. BPFdoor is a Linux/Unix backdoor that allows threat actors to remotely connect to a Linux shell to gain complete access to a compromised device.

Remote Access Trojan adds ransomware and DDoS attacks to usual bag of tricks
2022-04-05 17:51

Remote Access Trojan adds ransomware and DDoS attacks to usual bag of tricks. The Remote Access Trojan, or RAT for short, is a powerful tool among cybercriminals as it allows them to fully access and control a compromised computer or device to steal data or launch additional attacks.

New Borat remote access malware is no laughing matter
2022-04-03 14:02

A new remote access trojan named Borat has appeared on darknet markets, offering easy-to-use features to conduct DDoS attacks, UAC bypass, and ransomware deployment. As a RAT, Borat enables remote threat actors to take complete control of their victim's mouse and keyboard, access files, network points, and hide any signs of their presence.

Devious phishing method bypasses MFA using remote access software
2022-02-22 21:57

One of the biggest obstacles to successful phishing attacks is bypassing multi-factor authentication configured on the targeted victim's email accounts. D0x set up a phishing attack using the Evilginx2 attack framework that acts as a reverse proxy to steal credentials and MFA codes.

Malicious PowerPoint files used to push remote access trojans
2022-01-24 14:37

Since December 2021, a growing trend in phishing campaigns has emerged that uses malicious PowerPoint documents to distribute various types of malware, including remote access and information-stealing trojans. According to a report by Netskope's Threat Labs shared with Bleeping Computer before publication, the actors are using PowerPoint files combined with legitimate cloud services that host the malware payloads.

Remote access security strategy under scrutiny as hybrid/remote working persists
2021-10-18 04:30

While 83% of respondents say they are confident in their strategy for controlling access to applications for remote users, three-quarters are re-evaluating theirs in the wake of new ways of working and the growth in cloud application use. For 36% of organizations a zero trust approach also forms part of their remote access strategy.

How a vishing attack spoofed Microsoft to try to gain remote access
2021-10-14 18:41

A standard phishing attack typically involves sending people an email or text message spoofing a known company, brand or product in an attempt to install malware or steal sensitive information. The emails borrowed the look and layout of actual emails from Microsoft and even included information on a subscription for Microsoft Defender Advanced Protection that supposedly was ordered by the recipient.

Unpatched Dahua cams vulnerable to unauthenticated remote access
2021-10-07 10:56

Unpatched Dahua cameras are prone to two authentication bypass vulnerabilities, and a proof of concept exploit that came out today makes the case of upgrading pressing. This comes a month after Dahua's security advisory which urged owners of vulnerable models to upgrade their firmware, but considering how neglected these devices are following their initial installation and set up, it's likely that many of them are still running an old and vulnerable version.

New Passwordless Verification API Uses SIM Security for Zero Trust Remote Access
2021-08-26 02:47

As companies nudge their staff to return to communal workspaces, many workers don't actually want to - more than 50 percent of employees would rather quit, according to research by EY. While HR teams worry over the hearts and minds of staff, IT security professionals have a different battle plan to draft - how to make the new normal of the hybrid workplace secure. In a hybrid workplace, a Zero Trust strategy means ever-tightening security.