Remove 06
Remove 2014 Remove Data Remove Information Security Remove Security
article thumbnail

DarkHotel APT uses VPN zero-day in attacks on Chinese government agencies

Security Affairs

Chinese security-firm Qihoo 360 has uncovered a hacking campaign conducted by a DarkHotel APT group (APT-C-06) aimed at Chinese government agencies in Beijing and Shanghai. “Recently, Qihoo 360 captured malicious samples issued through hijacked security services of a domestic VPN vendor SangFor. are vulnerable.

article thumbnail

Microsoft warns of attacks delivering FlawedAmmyy RAT directly in memory

Security Affairs

FlawedAmmyy RAT allows stealing sensitive data from infected systems and exfiltrating files. pic.twitter.com/PQ2g7rvDQm — Microsoft Security Intelligence (@MsftSecIntel) June 21, 2019. — Microsoft Security Intelligence (@MsftSecIntel) June 21, 2019. wsus.exe decrypts and runs the final payload directly in memory.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google outages in Eastern US affected Gmail, G-Suite, YouTube, and more

Security Affairs

I discovered the problem because I was not able to access Analytics data for my blog. We will provide an update by Sunday, 2019-06-02 16:00 US/Pacific.” Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Cloud 77
article thumbnail

Security Affairs - Untitled Article

Security Affairs

Tesla paid $10,000 a researcher that found a stored cross-site scripting (XSS) vulnerability that could have been exploited to change vehicle information. He discovered that some information about the vehicle was collected from a page of Tesla application that was used to see the vital statistics of the car. Pierluigi Paganini.

article thumbnail

Zero-day vulnerability in Android OS yet to be patched

Security Affairs

” reads the security advisory published by ZDI. ” The vulnerability resides in the way the Video for Linux (V4L2) driver handles input data, it could be exploited by an attacker to elevate permissions to kernel level. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

Access 77
article thumbnail

Brazilian trojan banker is targeting Portuguese users using browser overlay

Security Affairs

At least since the year of 2014 that new variants have been observed, with minor changes, and with the objective of collecting bank details of the victims. Afterward, the malware runs on the compromised machine, collecting sensitive data from browsers, including credentials for accessing bank portals. Trojan banker (2nd stage).

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

First of all the attacker knew the target organization was protected by a SOC (Security Operation Center) so she sent a well crafted email claiming to deliver a Microsoft document wrapping out the weekly SOC report as a normal activity in order to induce the victim to open-it. SOC report 10 12 2019.doc Technical Analysis. Conclusion.