Remove 06
Remove 2015 Remove Data Remove Information Security Remove Security
article thumbnail

DarkHotel APT uses VPN zero-day in attacks on Chinese government agencies

Security Affairs

Chinese security-firm Qihoo 360 has uncovered a hacking campaign conducted by a DarkHotel APT group (APT-C-06) aimed at Chinese government agencies in Beijing and Shanghai. “Recently, Qihoo 360 captured malicious samples issued through hijacked security services of a domestic VPN vendor SangFor. are vulnerable.

article thumbnail

Microsoft warns of attacks delivering FlawedAmmyy RAT directly in memory

Security Affairs

FlawedAmmyy RAT allows stealing sensitive data from infected systems and exfiltrating files. pic.twitter.com/PQ2g7rvDQm — Microsoft Security Intelligence (@MsftSecIntel) June 21, 2019. — Microsoft Security Intelligence (@MsftSecIntel) June 21, 2019. wsus.exe decrypts and runs the final payload directly in memory.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google outages in Eastern US affected Gmail, G-Suite, YouTube, and more

Security Affairs

I discovered the problem because I was not able to access Analytics data for my blog. We will provide an update by Sunday, 2019-06-02 16:00 US/Pacific.” This detailed report will contain information regarding SLA credits.” Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

Cloud 86
article thumbnail

Security Affairs - Untitled Article

Security Affairs

Tesla paid $10,000 a researcher that found a stored cross-site scripting (XSS) vulnerability that could have been exploited to change vehicle information. He discovered that some information about the vehicle was collected from a page of Tesla application that was used to see the vital statistics of the car. Pierluigi Paganini.

article thumbnail

Zero-day vulnerability in Android OS yet to be patched

Security Affairs

” reads the security advisory published by ZDI. ” The vulnerability resides in the way the Video for Linux (V4L2) driver handles input data, it could be exploited by an attacker to elevate permissions to kernel level. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

Access 78
article thumbnail

Brazilian trojan banker is targeting Portuguese users using browser overlay

Security Affairs

Afterward, the malware runs on the compromised machine, collecting sensitive data from browsers, including credentials for accessing bank portals. The malware can also obtain data on the clipboard and it contains keylogger features to collect everything the victims are writing and send the information to the C2 server.

article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

First of all the attacker knew the target organization was protected by a SOC (Security Operation Center) so she sent a well crafted email claiming to deliver a Microsoft document wrapping out the weekly SOC report as a normal activity in order to induce the victim to open-it. SOC report 10 12 2019.doc Technical Analysis. Conclusion.