Equation: Has secretive cyberespionage group been breached?

A new attack group has released a data dump of leaked exploits and hacking tools they claim belong to the Equation group. Twitter Card Style:  summary An attack group calling itself the Shadow Brokers has released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range…

Read More

Instagram accounts hacked, altered to promote adult dating spam

Scammers are hacking Instagram accounts and altering profiles with sexually suggestive imagery to lure users to adult dating and porn spam. Twitter Card Style:  summary Earlier this year, we reported an influx of fake Instagram profiles luring users to adult dating sites. Over the last few months, we have observed Instagram accounts being hacked and…

Read More

Microsoft Patch Tuesday – August 2016

This month the vendor is releasing nine bulletins, six of which are rated Critical. Twitter Card Style:  summary Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor is releasing nine bulletins, six of which are rated Critical. As always, customers are advised to follow these security best practices: read…

Read More

Strider: Cyberespionage group turns eye of Sauron on targets

Low-profile group uses Remsec malware to spy on targets in Russia, China, and Europe. Twitter Card Style:  summary_large_image A previously unknown group called Strider has been conducting cyberespionage-style attacks against selected targets in Russia, China, Sweden, and Belgium. The group uses an advanced piece of malware known as Remsec (Backdoor.Remsec) to conduct its attacks. read…

Read More

New ransomware mimics Microsoft activation window

A new ransomlock variant, which mainly affects the US, tricks users into calling a toll-free number to reactivate their Windows computer. Twitter Card Style:  summary Symantec has discovered a new ransomware variant that pretends to originate from Microsoft and uses social engineering techniques to trick the victim into calling a toll-free number to “reactivate” Windows….

Read More

Latest Intelligence for July 2016

Our latest intelligence reveals that the Neutrino toolkit’s activity rose more than 10 percentage points in July. Twitter Card Style:  summary The Latest Intelligence page has been refreshed through July 2016, providing the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. Here are some key…

Read More

Another media-stealing app found on Google Play

The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices. Twitter Card Style:  summary Contributor: Tommy Dong Click to Tweet:  Another app that steals your pictures and videos found on Google Play Norton's AppAdvisor can warn you before you download a malicious app…

Read More