Sat.Apr 04, 2020

article thumbnail

Spear-Phishing Campaign Uses COVID-19 to Spread LokiBot

Data Breach Today

FortiGuard Labs Researchers Find WHO Images Used As Lure Again A recently uncovered spear-phishing campaign is using fears of the COVID-19 pandemic to spread an information stealer called LokiBot. FortiGuard Labs researchers find that cybercriminals are once again using WHO images as a lure.

Phishing 263
article thumbnail

Firefox 74.0.1 addresses two zero-days exploited in the wild

Security Affairs

Mozilla releases Firefox version 74.0.1 to address two vulnerabilities exploited by threat actors in attacks in the wild, users should update their browsers asap. Mozilla is urging users to install the latest version of its browser, Firefox 74.0.1 , which addresses two bugs that are being exploited in the wild by threat actors. The two vulnerabilities have been tracked as CVE-2020-6819 and CVE-2020-6820, both issues are user-after-free vulnerabilities that could be exploited to inject code in F

Security 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Firefox Zero-Day Flaws Exploited in the Wild Get Patched

Threatpost

Mozilla Foundation rushes patches to fix bugs in its browser that could allow for remote code execution.

IT 107
article thumbnail

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft declared that an Emotet attack took down an organization’s network by overheating all the computers and bringing its Internet access down. Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

Phishing 126
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to Create a Secure Client Portal

OneHub

As companies shift more to working from home and remote workforces, having a secure client portal is an easy and secure way to share and collaborate on sensitive documents. Clients can sign in to their own branded and secure workspace directly from your website, providing a simple and secure way to send and receive documents. . Creating a client portal is easy and cost-effective and can save you and your clients time and money.

More Trending

article thumbnail

Password on Forum Page

IG Guru

All, We have added a password to the forum page to curb spam. Your username and password to post on the forum is still the same. Contact us at igguru@protonmail.com for the password to the forum page. Thank you, IG GURU. The post Password on Forum Page appeared first on IG GURU.

article thumbnail

A Notorious Spyware Vendor Wants to Track Coronavirus Spread

WIRED Threat Level

Plus: An evacuated aircraft carrier, Iranian hackers, and more of the week's top security news.

article thumbnail

THUL y el Hechizo de las Almas Silentes

Archives Blogs

THUL y el Hechizo de las Almas Silentes [link]. Aunque no se trata del área de archivos, he pensado en recomendarles este libro para los días de cuarentena, es muy divertido fácil de leer y entender. Muy bueno para pasar un buen rato. Disfrutenlo. El sátiro THUL narra con su entrañable léxico las aventuras que vivió junto a GARUDA – el hechicero de túnica negra – y otro grupo de villanos personajes, en pos de conseguir el Hechizo de las Almas Silentes, el cual le otorgaría a su amo D

26