Nearly half a mill hit by four malignant Chrome Extensions

According to security researchers at US cyber firm ICEBRG have located four Chrome extensions which house malevolent code that were available through the official Chrome Web Store which allowed attackers to send commands through to users’ browsers in the JavaScript code form. View Full Story ORIGINAL SOURCE: Bleeping Computer The post Nearly half a mill hit by four malignant Chrome Extensions appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

January 16, 2018
Read More >>

Increased cloud adoption increases data security risk

In the latest Ponemon Institute “2018 Global Cloud Data Security Study”, results have shown that organisations in the UK (35%), Brazil (34%) and Japan (31%) are less cautious than those in Germany (61%) when sharing sensitive and confidential information stored in the cloud with third parties. View Full Story  ORIGINAL SOURCE: Helpnetsecurity The post Increased cloud adoption increases data security risk appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

January 16, 2018
Read More >>

RubyMiner malware used to mine Cryptocurrency from outdated Windows and Linux servers

News has surfaced that a new strain of malware called RubyMiner is being used by cyber criminals to target outdated Linux and Windows serves to secretly mine cryptocurrency. According to Check Point researchers, the criminal has been using RubyMiner to plant the cryptocurrency miner XMrig on vulnerable systems to hijack users’ CPU processing power and covertly mine Monero coins. The attacks are thought to have began from the 9th January,…

January 16, 2018
Read More >>

Watch out for the fake Meltdown and Spectre patches

It has been discovered that hackers have been distributing fake patches to deliver malicious malware called Smoke Loader. The so-called ‘patches’ have been masked as fixes for the Meltdown and Spectre vulnerabilities that is said to have affected nearly every modern CPU worldwide. View Full Story ORIGINAL SOURCE: IBTimes UK The post Watch out for the fake Meltdown and Spectre patches appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

January 16, 2018
Read More >>

Learning to live left of breach

The cybersecurity industry tends to focus its attention on what to do after a breach or a hack occurs. After all, this is the topic of discussion for the media, or an organisations’ partners and customers. “What does the victim do now?” But shouldn’t we at least be as interested, if not more so, in what the organisation should be doing before a breach ever occurs? This is how we’ve…

January 16, 2018
Read More >>