PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Cyber Threats

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cyber BitesCyber Threats

New CookieMiner malware can steal all kinds of financial credentials.

CookieMiner is a new malware strain capable of stealing and exfiltrating web browser cookies related to online wallet services and cryptocurrency exchange websites, as well as passwords, text messages, and credit card credentials. The newly identified malware targets Mac devices and shares at least some of its code with the OSX.DarthMiner and OSX.LamePyre strains discovered by Malwarebytes during December 2018. Source: Bleeping Computer The post New CookieMiner malware can steal all kinds of financial credentials. appeared first on IT Security Guru.

Cyber BitesCyber Threats

Mac Users targeted by Malware in Ad-Based images.

191, 970 bad ads and an estimated 1 million users have been impacted by a Malware in Ad-based images, researchers have discovered. A massive adware campaign that hides malware in image files using steganography techniques has impacted up to a million Mac users. When a user clicks on an infected image, the malicious ad infects the Mac user with the Shlayer trojan. Source: Threatpost The post Mac Users targeted by Malware in Ad-Based images. appeared first on IT Security Guru.

Cyber BitesCyber Threats

Bitcoin mining rigs in China being locked up by new ransomware.

Named hAnt, this ransomware strain was first identified in August 2018, but new infections have been reported this month. The ransomware targets Bitcoin mining rigs with most infections located in China. hAnt infects a mining rig, locking up the device and requesting that 10 Bitcoin ($36,000) ransom is paid or the victim must infect at least 1000 other devices to remove the ransomware. Source: ZD Net The post Bitcoin mining rigs in China being locked up by new ransomware. appeared first on IT Security…

Cyber BitesCyber Threats

Anatova Ransomware poses as game and software to tricks users into downloading.

Anatova ransomware emerged on 1st January 2019 and was discovered by security researchers at McAfee. The software is infecting users around the world by posing as an application or game. Users are tricked into downloading and launching these malicious files onto their computer. The largest number of victims are in the US but the ransomware has also been spotted in Belgium, Germany, France and UK. Source: ZD Net The post Anatova Ransomware poses as game and software to tricks users into downloading. appeared first…

Cyber BitesCyber Threats

Millions of Bank loans and mortgage documents have been leaked online.

24 million financial and banking documents have been found on an unprotected server, running an Elasticsearch database. The server had decade’s worth of data, including highly sensitive financial data, social security numbers, names, loan and mortgage agreements, and repayment schedules. The leak was traced to Ascension, a data analytics company, that converts paper documents into computer files. Source: Techcrunch The post Millions of Bank loans and mortgage documents have been leaked online. appeared first on IT Security Guru.

Cyber BitesCyber Threats

Ransomware attacks on cloud infrastructure exposed.

Threat Researchers at Securonix have reported a rise in attacks that target vulnerabilities in Hadoop components, such as Hadoop YARN, Redis and ActiveMQ. The researchers warned of an increase in the number of multi-vector and multi-platform automated attacks against cloud infrastructure over the past few months. These attacks frequently include crypto mining, ransomware and botnet malware. Source: The Register The post Ransomware attacks on cloud infrastructure exposed. appeared first on IT Security Guru.

Cyber ThreatsFeaturedThe Internet of Things

Threat Spotlight: IoT Application Vulnerabilities Leave IOT Devices Open To Attack.

IoT devices were popular gifts again this holiday season. An acronym for Internet of Things, IoT is more than a buzzword. The trend represents a huge shift in how products are made and used, as network connectivity is added to products that were not previously intended to have this functionality. So, your refrigerator that sends you a text message when you’re out of milk: IoT. Your thermostat that provides usage graphs on your phone: yep, IoT. Basically, any consumer device capable of connecting to…

Cloud SecurityCyber Threats

CrowdStrike Recognized As The Highest-Ranking Vendor In The January 2019 Gartner Peer Insights Customers’ Choice For Endpoint Detection And Response Solutions.

CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced that as of January 21, 2019, it has an overall rating of 4.8 out of 5 stars – the highest overall score of all vendors named to the January 2019 Gartner Peer Insights Customers’ Choice for Endpoint Detection and Response Solutions. This distinction is based on 78 verified customer reviews. Also, as of January 21, 2019, CrowdStrike has the highest overall rating of the vendors named to the November 2018 Gartner Peer Insights Customers’…

Cyber ThreatsThreat Detection

Something In Common: Two Notorious Russian Speaking Hacking Groups Found Sharing Infrastructure With Each Other.

Kaspersky Lab experts have identified an overlap in cyberattacks between two infamous threat actors, GreyEnergy – which is believed to be a successor of BlackEnergy – and the Sofacy cyberespionage group. Both actors used the same servers at the same time, with, however, a different purpose. BlackEnergy and Sofacy hacking groups are considered to be two of the major actors in the modern cyberthreat landscape. In the past, their activities often led to devastating national level consequences. BlackEnergy inflicted one of the most notorious…