Experts discovered Chrome largest spyware installation campaign

Specialists from the company Awake Security reported about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains and used extensions in Chrome to install malware on victims’ dispositivos. Users installed spyware through 32,962,951 downloads of various malicious extensions. “The Awake Security ThreatSeguir leyendo Experts discovered Chrome largest spyware installation campaign

Vulnerabilidades en el antiguo protocolo GTP podrían afectar a las redes 4G y 5G

Los expertos advirtieron que las vulnerabilidades en el antiguo GTP (GPRS Tunneling Protocol) could quite seriously affect the operation of 4G and 5G networks. In reports published last week and in December 2019, Positive Technologies and A10 Networks described in detail a number of vulnerabilities in this protocol. En particular, are known the following problems: Disclosure ofSeguir leyendo Vulnerabilidades en el antiguo protocolo GTP podrían afectar a las redes 4G y 5G

GitHub reemplazará el término “maestro” por uno más neutral

Nat Friedman, liderando GitHub después de adquirir Microsoft en 2018, dijo en Twitter que GitHub reemplazará el término "maestro" por un sinónimo más neutral. Por ejemplo, principal, para evitar referencias innecesarias a la época de la esclavitud. Si esto realmente sucede, GitHub will become one of the many IT companies and open source projects that in recent yearsSeguir leyendo GitHub reemplazará el término “maestro” por uno más neutral

La empresa italiana de TI CloudEyE colaboró ​​con operadores de ransomware

Durante unos cuatro años, the Italian company CloudEyE was engaged in a seemingly legal business, offering protection of binaries from reverse engineering for Windows applications, sin embargo, al mismo tiempo, CloudEyE secretly advertised its services on the black market and collaborated with ransomware operators. Check Point experts discovered this when they began to investigate theSeguir leyendo La empresa italiana de TI CloudEyE colaboró ​​con operadores de ransomware

Aplicaciones falsas de seguimiento de contactos de COVID-19 instalan troyanos bancarios

Investigadores de la empresa de IS Anomali, con sede en California, han descubierto 12 fake COVID-19 patient contact tracking apps posing as official programs. Attackers are actively exploiting the panic around the coronavirus pandemic to trick users into revealing their credentials. “Fake applications are designed to download and install malware (Anubis, SpyNote, etc.) onto devices and steal users’ financial andSeguir leyendo Aplicaciones falsas de seguimiento de contactos de COVID-19 instalan troyanos bancarios

SGAxe attack endangers Intel processors

Como parte de la “Actualización del Martes” de junio,” Intel fixed more than 20 different vulnerabilities in its products, including the SGAxe bug, which endangers several Intel processors. The manufacturer also released updated microcodes for processors vulnerable to the new CrossTalk MDS problem. But CrossTalk was not limited to this, and this week it became known aboutSeguir leyendo SGAxe attack endangers Intel processors

On June “Patch Tuesday” Microsoft fixed 129 vulnerabilities in its products

“Patch Tuesday” this month became the largest in the history of Microsoft: were fixed at once 129 vulnerabilidades. Marzo 2020 con 115 corrections is in second place, y 113 corrections in April 2020 arein a third place. 100 absolutely “ridiculous” Microsoft patches were presented in February “Patch Tuesday”, but among them was the sensational 0-daySeguir leyendo On June “Patch Tuesday” Microsoft fixed 129 vulnerabilities in its products

Google Maps helps users protect themselves from COVID-19

Google has added a number of new features to its mapping service to help users protect themselves from COVID-19. Google Maps now provides travelers and people on duty with public transport information on how the COVID-19 pandemic could affect their trip. Among other updates, now the Google Maps application will display notifications of restrictions imposedSeguir leyendo Google Maps helps users protect themselves from COVID-19

Tycoon ransomware uses exotic JIMAGE format to avoid detection

Los expertos de BlackBerry han descubierto una inusual multiplataforma (for Windows and Linux) ransomware Tycoon. It is written in Java and uses JIMAGE image files to avoid detection. Researchers believe Tycoon was used for targeted and very rare attacks, in favor of this theory says number of victims and applied delivery mechanism. De este modo, the ransomware was clearlySeguir leyendo Tycoon ransomware uses exotic JIMAGE format to avoid detection

Los foros de hackers muestran una creciente demanda de credenciales de los canales de YouTube

IntSights experts found that recently in the darknet there increased interest YouTube Channel Credentials, y también, as a “side effect”, this stimulates data verification activities. On hacker forums and sites that sale credentials, you can find more and more offers of this kind. It should be noted that cybercriminals for a long time were interestedSeguir leyendo Los foros de hackers muestran una creciente demanda de credenciales de los canales de YouTube