Remove 01
article thumbnail

CISA adds bugs in Chrome and macOS to its Known Exploited Vulnerabilities catalog

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) has added the following five new issues to its Known Exploited Vulnerabilities Catalog : CVE-2019-8526 – Apple macOS Use-After-Free Vulnerability. The issue was used to dump iCloud Keychain if the macOS version is lower than 10.14.4.

IT 80
article thumbnail

CISA adds Veritas Backup Exec flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

IT 80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds WatchGuard flaw to its Known Exploited Vulnerabilities Catalog

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) added the CVE-2022-23176 flaw in WatchGuard Firebox and XTM appliances to its Known Exploited Vulnerabilities Catalog. WatchGuard published instructions on how to restore compromised Firebox appliances. To nominate, please visit:? Follow me on Twitter: @securityaffairs and Facebook.

IT 83
article thumbnail

Hackers are again attacking Portuguese banking organizations via Android Trojan-Banker

Security Affairs

List of some baking campaigns this Brazilian threat group has performed in Portugal: 13/03 – Novo Banco Trojan-Banker 12/03 – Caixa Geral Depósitos 13/02 – Millennium BCP e Montepio 20/01 – Montepio e Millennium BCP 14/01 – Santander e Novo Banco 12-2019/01-2020: Lampion Trojan (…). Pierluigi Paganini.

article thumbnail

Brazilian trojan banker is targeting Portuguese users using browser overlay

Security Affairs

One of the last occurrences was last December 2019, where the Lampion trojan operated in a very similar way, changing only the way the malware was distributed (via AWS S3 buckets and with the first stage encoded in a highly obfuscated VBS file). In detail, the bitcoin wallet was used in recent transactions, last: 2020-01-14 00:22h.

article thumbnail

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

In February 2019, SI-LAB captured multiple samples of phishing campaigns using an Office Excel document carrying a malicious Excel 4.0 File name: patent-2019-02-20T093A283A05-1.xls This binary was signed on Tuesday, February 19th, 2019, and the next email is also associated: NastasyaTurkina68@mail.ru; from a Russian provider.

article thumbnail

ForAllSecure Launches The Hacker Mind Podcast

ForAllSecure

Transcript for EP 01: Why Is West Point Training Hackers? I'm Robert Vamosi, and in this episode I'm talking about the shortage of infosec experts and how, through the use of computer Capture the Flag competitions, or CTF, the US military, for example, is attempting to address the shortage of information security experts through gamification.