Microsoft Patch Tuesday – September 2016

This month the vendor released 13 bulletins, six of which are rated Critical. Twitter Card Style:  summary Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor released 13 bulletins, six of which are rated Critical. As always, customers are advised to follow these security best practices: read more Source:…

Read More

Latest Intelligence for August 2016

Our Latest Intelligence reveals that the number of new malware variants hit 45.5 million in August, the highest level seen since last year. Twitter Card Style:  summary The Latest Intelligence page has been refreshed through August 2016, providing the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware, spam, and other potentially harmful…

Read More

TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations

Original release date: September 06, 2016 Systems Affected Network Infrastructure Devices  Overview The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security personnel and network administrators to protect information systems. Protecting the network infrastructure is critical to preserve…

Read More

Buckeye cyberespionage group shifts gaze from US to Hong Kong

Several organizations in Hong Kong are being targeted by a cyberespionage group known as Buckeye. Twitter Card Style:  summary Buckeye (also known as APT3, Gothic Panda, UPS Team, and TG-0110) is a cyberespionage group that is believed to have been operating for well over half a decade. Traditionally, the group attacked organizations in the US…

Read More

Trident: Trio of iOS zero-days being exploited in the wild

Users of iPhones and other iOS devices are advised to upgrade to the latest version of the operating system. Twitter Card Style:  summary Three zero-day vulnerabilities in Apple’s iOS mobile operating system are being exploited in the wild in targeted attacks. The vulnerabilities, collectively dubbed “Trident”, can be exploited by attackers to remotely jailbreak Apple…

Read More

Non-existent video involving Hillary Clinton and ISIS leader used as bait in malicious spam

Malicious attachment contains Adwind cross-platform remote access Trojan. Twitter Card Style:  summary Contributors: Paul Mangan, Kevin Savage Cybercriminals are using clickbait, promising a video showing Democratic Party presidential nominee Hillary Clinton exchanging money with an ISIS leader, in order to distribute malicious spam emails. read more Source: Symantec

Read More

Equation: Has secretive cyberespionage group been breached?

A new attack group has released a data dump of leaked exploits and hacking tools they claim belong to the Equation group. Twitter Card Style:  summary An attack group calling itself the Shadow Brokers has released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range…

Read More

Instagram accounts hacked, altered to promote adult dating spam

Scammers are hacking Instagram accounts and altering profiles with sexually suggestive imagery to lure users to adult dating and porn spam. Twitter Card Style:  summary Earlier this year, we reported an influx of fake Instagram profiles luring users to adult dating sites. Over the last few months, we have observed Instagram accounts being hacked and…

Read More