article thumbnail

Horde Webmail Software is affected by a dangerous bug since 2012

Security Affairs

A feature in the Horde Webmail is affected by a nine-year-old unpatched security vulnerability that could be abused to gain complete access to email accounts simply by previewing an attachment. Horde Webmail is a free, enterprise-ready, and browser-based communication suite developed by the Horde project. ” continues the report.

Access 103
article thumbnail

PurpleFox botnet variant uses WebSockets for more secure C2 communication

Security Affairs

Researchers warn of a new evolution of the PurpleFox botnet, operators included exploits and leverage WebSockets for C2 communication. Its operators have added new exploits and payloads, according to the experts, the new variant leverages WebSockets to implement more secure C2 bidirectional communication. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian govn blocked Tutanota service in Russia to stop encrypted communication

Security Affairs

Tutanota is disappointed of the block and explained that the decision of the Kremlin is an act against encryption and confidential communication in Russia. “Tutanota focuses on providing a secure and confidential communication channel to citizens, but also to journalists and activists.” ” states Tutanota.

article thumbnail

Google dorks were the root cause of a catastrophic compromise of CIA’s communications

Security Affairs

Google queries allowed Iran Government to dismantle the CIA communication network used by its agents and kill dozens of tens of spies. The alleged hack of the communications network used by CIA agents allowed Iranian intelligence to identify and kill at least 30 spies. According to Yahoo ! ” reported Yahoo News.

article thumbnail

A PowerShell Script to Mitigate Active Directory Security Risks

eSecurity Planet

That’s the case with Active Directory legacy protocols, so to help you secure your Active Directory environment, we’ve created a script to help you ensure that legacy protocols are disabled. Your primary goal in securing Active Directory infrastructure is to reduce the attack surface. for better security. protocol.

Risk 142
article thumbnail

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

The Platinum cyber espionage group uses steganographic technique to hide communications with the Command and Control Servers (C&C). Experts from Kaspersky have linked the Platinum APT group with cyber attacks involving an elaborate, and new steganographic technique used to hide communications with C2 servers. Pierluigi Paganini.

article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies , which offers paying customers the ability to route their web traffic anonymously through compromised computers. The BHProxies website. The website BHProxies[.]com Hope you are doing well.

Passwords 234