Tuesday, March 31, 2015

Ad Networks Ripe for Abuse Via Malvertising Secure Hunter

Criminals have found a safe haven abusing legitimate processes, such as real-time bidding, implemented by online advertising networks to move exploits and malware, and build botnets and fraud campaigns.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Ad Networks Ripe for Abuse Via Malvertising Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/19EIF8i

Secure Hunter

Monday, March 30, 2015

DDoS Attack Against GitHub Continues After More Than Four Days Secure Hunter

More than four days after it began, the massive DDoS attack on GitHub is still ongoing. The attack has evolved significantly since it started and GitHub officials said they believe that the goal of the operation is to force the site to remove some specific content. In the evening hours of March 25, DDoS attack […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post DDoS Attack Against GitHub Continues After More Than Four Days Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1NwBfS3

Secure Hunter

Tuesday, March 24, 2015

Using Heat to Jump Air-Gapped Computers Secure Hunter

Researchers claim that when thermal energy from one computer is detected by an adjacent computer it can facilitate the spread of keys and malware.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Using Heat to Jump Air-Gapped Computers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1BLmEuZ

Secure Hunter

Friday, March 20, 2015

Thursday, March 19, 2015

Tuesday, March 17, 2015

Friday, March 13, 2015

Mozilla Releases Open Source Masche Forensics Tool Secure Hunter

Mozilla has released an open source memory forensics tool that some college students designed and built during the company’s recent Winter of Security event. The new tool, known as Masche, is designed specifically for investigating server memory and has the advantage of being able to scan running processes without causing any problems with the machine. […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Mozilla Releases Open Source Masche Forensics Tool Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1Fbs9Jl

Secure Hunter

Obama Administration Seeks More Legal Power to Disrupt Botnets Secure Hunter

The federal government is seeking more legal power to step in and shut down botnets through an amendment to the existing criminal law, which would allow the Department of Justice to obtain injunctions to disrupt these malicious networks. The Obama administration has proposed an amendment to existing United Stated federal law that would give it […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Obama Administration Seeks More Legal Power to Disrupt Botnets Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1Mxyi34

Secure Hunter

Thursday, March 12, 2015

CryptoLocker Variant Coming After Gamers Secure Hunter

A variant of CryptoLocker ransomware is targeting gamers, encrypting files associated with more than 20 popular titles in exchange for a Bitcoin payment.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post CryptoLocker Variant Coming After Gamers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1BaF0Fy

Secure Hunter

CloudFlare Aims to Defeat Massive DDoS Attacks with Virtual DNS Secure Hunter

DDoS attacks have been a persistent problem for the the better part of 20 years, and as ISPs and enterprises have adjusted their defenses, attackers have adapted their tactics. One of the more effective tools in the attackers’ arsenal now is the use of botnets to generate massive numbers of DNS queries for a target […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post CloudFlare Aims to Defeat Massive DDoS Attacks with Virtual DNS Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1GIwGVy

Secure Hunter

Wednesday, March 11, 2015

Details Surface on Stuxnet Patch Bypass Secure Hunter

HP’s Zero Day Initiative published details of a bypass for a five-year-old Windows patch for the .LNK vulnerability exploited by Stuxnet.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Details Surface on Stuxnet Patch Bypass Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1C78JEL

Secure Hunter

Equation APT Group Attack Platform A Study in Stealth Secure Hunter

The EquationDrug cyberespionage platform is a complicated system that is used selectively against only certain target machines, one that can be extended via a collection of 116 malware plug-ins, researchers at Kaspersky Lab said.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Equation APT Group Attack Platform A Study in Stealth Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1b1Qo1I

Secure Hunter

Tuesday, March 10, 2015

Patched Windows Machines Exposed to Stuxnet LNK Flaw All Along Secure Hunter

Microsoft released a new patch for the LNK vulnerability exploited by Stuxnet after it learned original patch from 2010 failed and left Windows machines exposed.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Patched Windows Machines Exposed to Stuxnet LNK Flaw All Along Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1NGOx1h

Secure Hunter

Monday, March 9, 2015

New Technique Complicates Mutex Malware Analysis Secure Hunter

A recent malware sample dynamically generates the name of a mutex object by using Windows product ID, lessening its predictability and complicating detection.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post New Technique Complicates Mutex Malware Analysis Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1E7li2e

Secure Hunter

Friday, March 6, 2015

Dridex Banking Trojan Spreading Via Macros in XML Files Secure Hunter

A phishing campaign that spiked this week is pushing the Dridex banking Trojan via malicious macros embedded in XML file attachments.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Dridex Banking Trojan Spreading Via Macros in XML Files Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1wN34mV

Secure Hunter

Mandarin Oriental Confirms Data Breach at U.S., European Hotels Secure Hunter

The Mandarin Oriental luxury hotel chain is investigating a data breach that affects credit cards used in an “isolated number” of its hotels in the United States and Europe. Company officials said that the attack involved “undetectable” malware on some of its systems and emphasized that only credit card data, and no other personal information, […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Mandarin Oriental Confirms Data Breach at U.S., European Hotels Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1FjG3an

Secure Hunter

Wednesday, March 4, 2015

New POS Malware Uses Mailslots to Avoid Detection Secure Hunter

A new type of POS malware, LogPOS, is using technology that evades detection by letting the malware inject code while it shuttles stolen credit card numbers to its C+C server.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post New POS Malware Uses Mailslots to Avoid Detection Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1GjCswT

Secure Hunter

Tuesday, March 3, 2015

Monday, March 2, 2015

Older Keen Team Use-After-Free IE Exploit Added to Angler Exploit Kit Secure Hunter

Attackers behind one of the more popular exploit kits, Angler, have added a tweaked version of an exploit from last fall, a use after free vulnerability in Microsoft’s Internet Explorer browser.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Older Keen Team Use-After-Free IE Exploit Added to Angler Exploit Kit Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AypVgC

Secure Hunter