] The Mad Hacker [

online
mad hacker

Collecting all the news about Cybersecurity, computer security, cracking, hacking, infosec, netsec, & security vunerabilities in one convenient place

Whitehat, greyhat, blackhat, tinker, tailor, solider, spy
We trawl the web so you don't have to
Since 2000

the mad hacker overlay

Teenage girls tempt Israeli soliders to install spyware for Hamas

(Monday February 17, 2020)
It’s not the first time Israeli soldiers have been targeted with Hamas honeytraps to infect their smartphones with spyware.

Twitter accounts of The Olympics and FC Barcelona hijacked by OurMine hacking group

(Monday February 17, 2020)
The International Olympic Committee and FC Barcelona are the latest victims of a spree of Twitter account hijacks orchestrated by the notorious OurMine gang. Read more in my article on the Hot for Security blog.

Is this legit?

(Monday February 17, 2020)
Post with 1 votes and 15 views. Shared by FeoisthereRager. Is this legit?

Google pulls 500 malicious Chrome extensions after researcher tip-off

(Monday February 17, 2020)
Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.

Google forced to reveal anonymous reviewer’s details

(Monday February 17, 2020)
A court has forced Google to reveal the details of an anonymous poster who published an unpalatable review of a dentist.

Senator calls for dedicated US data protection agency

(Monday February 17, 2020)
The US needs a data protection agency of its own, and Kirsten Gillibrand wants to be the one that makes it happen.

Police bust alleged operator of Bitcoin mixing service Helix

(Monday February 17, 2020)
The Ohio man is charged with running a Bitcoin mixer to launder over $300m—now worth $3.6b—on behalf of Dark Net crooks trying to hide out.

Israeli soldiers tricked into installing malware by Hamas agents posing as women

(Monday February 17, 2020)
IDF: Six social media accounts were redirecting soldiers to installing three malware-infected apps. [/meet-the-team/us/catalin.cimpanu/#ftag=CAD-00-10aag7e] By Catalin Cimpanu [/meet-the-team/us/catalin.cimpanu/#ftag=CAD-00-10aag7e] for Zero Day [/blog/security/#ftag=CAD-00-10aag7e] | February 17, 2020 -- 00:10 GMT (00:10 GMT) | Topic: Security [/topic/security/#ftag=CAD-00-10aag7e] Image: IDF Members of the Hamas Palestinian militant group have posed as young teenage girls to lure...

Monday review – the hot 24 stories of the week

(Monday February 17, 2020)
Get yourself up to date with everything weve written in the last seven days - its weekly roundup time.

5 things you should know about cybersecurity insurance

(Monday February 17, 2020)
You leave kerosene-soaked rags all around your house. You chain smoke. One day, while relaxing in front of an episode of CSI:Cyber, your hand slips and a lit cigarette sets your sofa on fire. Your house burns down. The insurance company pays out your fire insurance.(Insider Story)

The CSO's playbook for forging board relationships

(Monday February 17, 2020)
Selim Aissi, CISO at software company Ellie Mae, saw it as confirmation of his role as trusted adviser when one of his company’s board members texted him late one night a few years ago.(Insider Story)

Second Likud Party app voter data leak

(Monday February 17, 2020)
A second and more serious data breach has been uncovered in the Elector firm’s election software that Likud has been using in its Knesset campaign, as reported by the Calcalist business daily on Sunday. Both hacking incidents, which occurred within a week of one another, involved the leak of the entire registry of Israeli voters […] The post Second Likud Party app voter data leak [https://www.itsecurityguru.org/2020/02/17/second-likud-party-app-voter-data-leak/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

144K Canadians’ personal information breached by federal entities

(Monday February 17, 2020)
A handful of Canadian government departments and agencies have reportedly compromised the personal information of 144,000 individuals across 7,992 breaches experienced over the past two years. As reported by the Canadian Broadcasting Corporation (CBC), the Canadian government revealed the information in an answer to an order paper question filed by Conservative MP Dean Allison late […] The post 144K Canadians’ personal information breached by federal entities [https://www.itsecurityguru.org/2020/02/17/144k-canadians-personal-information-breached-by-federal-entities/] appeared first on IT...

Olympics and FC Barcelona Twitter accounts hacked

(Monday February 17, 2020)
The official Twitter accounts for the Olympics and FC Barcelona were hacked Saturday by the same group responsible for years of other prominent Twitter account hacks. A Twitter spokesperson confirmed to Business Insider that both the Olympics and FC Barcelona accounts were hacked by a group called OurMine and through a “third-party platform.” Source: Business […] The post Olympics and FC Barcelona Twitter accounts hacked [https://www.itsecurityguru.org/2020/02/17/olympics-and-fc-barcelona-twitter-accounts-hacked/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

VPN servers hit by Iranian hackers

(Monday February 17, 2020)
2019 will be remembered as the year when major security bugs were disclosed in a large number of enterprise VPN servers, such as those sold by Pulse Secure, Palo Alto Networks, Fortinet, and Citrix. A new report published today reveals that Iran’s government-backed hacking units have made a top priority last year to exploit VPN […] The post VPN servers hit by Iranian hackers [https://www.itsecurityguru.org/2020/02/17/vpn-servers-hit-by-iranian-hackers/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

Coronavirus misinformation smishing increases in South Korea

(Monday February 17, 2020)
The South Korean government has warned the public of a sharp rise in smishing attempts — scam text messages — that use misinformation about the novel coronavirus outbreak. As of February 15, 9,688 smishing texts had been sent that used false information on the novel coronavirus, the Ministry of Science and ICT, South Korean police, […] The post Coronavirus misinformation smishing increases in South Korea [https://www.itsecurityguru.org/2020/02/17/coronavirus-misinformation-smishing-increases-in-south-korea/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

Themegrill vulnerability allowed unauthenticated database wipe and auth bypass. Update asap as 200k+ sites affected!

(Monday February 17, 2020)
There is a critical vulnerability in ThemeGrill Demo Importer that leads to database wipe and auth bypass. In the versions 1.3.4 and above.

Huawei Controversy Highlights 5G Security Implications

(Monday February 17, 2020)
Security experts say that 5G supply chain concerns should be taken seriously – whether it’s in the context of Huawei or not.

Hack-Proof Your Home: Preventing Home Security System Invasions

(Monday February 17, 2020)
Now, even home security systems aren't safe from the hands of these hackers. There are numerous ways a hacker can successfully bypass your security. Though some hackers want to mess around, there are people who hack into these systems to break into a house.

Hamas used pretty women to attempt cyber attack: Israel

(Monday February 17, 2020)
The military said it thwarted the malware which affected phones of some soldiers Israel's military said on Sunday it had thwarted an attempted malware attack by Hamas that sought to gain access to sol.

Trying to explain password choices to non-security people.

(Monday February 17, 2020)
Articles [/] Brian Graham [/] [/search] [“password”] Feb 17 FEB 17 “PASSWORD” Brian Graham [/?author=5e0b485b2119221261e7492f] Administrators of new wifi access points have a hard task: find a password that guests can remember, and hackers won’t. You’ll want to prevent hackers from accessing your system. Who’s going to hack your system? How will they hack in? Unfortunately, long gone are the days of hackers sitting in dark rooms wearing face-coverings guessing...

Pelosi, Pompeo turn up the heat on China's Huawei at security conference

(Monday February 17, 2020)
And China responds, saying criticisms about the security of its tech are based on "lies" and an unwillingness to "accept the success of a socialist country," a report says.

HackTheBox - Lame

(Monday February 17, 2020)

Cyber Threat Intelligence - Grad Research Capstone

(Monday February 17, 2020)
Javascript is required to load this page.

A friend recently got hit with Dever ransomware. The attacker appears to have been active for 14 minutes, dropping tools such as Mimikatz and Lazagne and then launching Dever ransomware which included SMB scanning, persistence mechanisms and lateral movement. See the timeline, summary and IOCs below

(Sunday February 16, 2020)
My friend recently got hit with Dever ransomware. This blog post will talk about the network architecture of the environment, live incident response, an interesting prefetch, timeline of the attack, info on Dever ransomware, summary and IOCs.

Google IT training is a idea to start?

(Sunday February 16, 2020)

VTSCAN - scan a malicious file from terminal using VirusTotal API

(Sunday February 16, 2020)
VirusTotal API script. Contribute to TheSecondSun/VTSCAN development by creating an account on GitHub.

How AI is being used to detect and fight ransomware attacks, and how criminals could use AI to plot more efficient ransomware attacks

(Sunday February 16, 2020)
Ransomware is increasingly targeting cities, public utilities, and institutions. AI can improve defenses -- or sharpen attacks.

HackTheBox - Legacy

(Sunday February 16, 2020)

Oversight - bbuseruploads.s3?

(Sunday February 16, 2020)
 DOWNLOAD Mac malware often spies on users by recording audio and video sessions...sometimes in an undetected manner. OverSight monitors a mac's mic and webcam, alerting the user when the internal mic is activated, or whenever a process accesses the webcam. compatibility: OS X 10.10+ current version: 1.2.0 (CHANGE LOG [/changelogs/OverSight.txt]) zip's sha-1: adae7e8a2d4f78489205d6b0c3017c3ebf733f6f One of the most insidious actions of malware, is abusing the audio and video...

Vulnhub writeup: Five86-1 ( no metasploit )

(Sunday February 16, 2020)
Medium Get The App

How to DOS (Denial of Service) Attack Your Own Wifi with Kali Linux

(Sunday February 16, 2020)
Learn how to disable or DOS (Denial of Serice) attack your own wifi. Using Kali Linux you will be able to completely disable all connections to your wifi.

Signal Is Finally Bringing Its Secure Messaging to the Masses

(Saturday February 15, 2020)
The encryption app is putting a $50 million infusion from WhatsApp cofounder Brian Acton to good use, building out features to help it go mainstream.

Ultrasonic bracelet jams the microphones around you

(Saturday February 15, 2020)
Smart speakers and other microphone-equipped devices aren't supposed to listen all the time, but there might be a solution if you aren't willing to take any cha...

HackTheBox: Json - Writeup by rizemon

(Saturday February 15, 2020)
3cc8XXXXXXXXXXXXXXXXXXXXXXXXXXXX Rooted ! Thank you for reading and look forward for more writeups and articles !

UK Police Deny Responsibility for Poster Urging Parents to Report Kids for Using Kali Linux, Discord, Virtual Machines, & Tor Browser | ZDNet

(Saturday February 15, 2020)
Updated: Using Discord, too, is apparently a warning sign that your child is turning into a naughty hacker.

Content Security Policy (CSP) Bypasses

(Saturday February 15, 2020)
Bypass the content security policy (CSP) via JSONP endpoints, CSP injection, wildcards *, and other misconfigurations.

Google Removed Over 500 Chrome Extensions Due to Malware Concerns

(Saturday February 15, 2020)
Google Removed Over 500 Chrome Extensions Due to Malware Concerns

CVE-2020-0668 - A Trivial Privilege Escalation Bug in Windows Service Tracing

(Saturday February 15, 2020)
In this post, I’ll discuss an arbitrary file move vulnerability I found in Windows Service Tracing. From my testing, it affected all versions of Windows from...

Martin and Dorothie Hellman on Love, Crypto & Saving the World

(Saturday February 15, 2020)
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.

Hypervisor Necromancy; Reanimating Kernel Protectors

(Saturday February 15, 2020)
Phrack staff website.

Phishing Campaign Targets Mobile Banking Users

(Friday February 14, 2020)
Consumers in dozens of countries were targeted, Lookout says.

500 Malicious Chrome Extensions Impact Millions of Users

(Friday February 14, 2020)
The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites.

Palm Beach Elections Office Hit with Ransomware Pre-2016 Election

(Friday February 14, 2020)
Palm Beach County's elections supervisor does not believe the attack is linked to Russian hacking attempts targeting Florida.

A Light at the End of Liberty Reserve’s Demise?

(Friday February 14, 2020)
In May 2013, the U.S. Justice Department seized Liberty Reserve, alleging the virtual currency service acted as a $6 billion financial hub for the cybercrime world. Prompted by assurances that the government would one day afford Liberty Reserve users a chance to reclaim any funds seized as part of the takedown, KrebsOnSecurity filed a claim shortly thereafter to see if and when this process might take place. This week, an investigator with the U.S. Internal Revenue service finally got in touch to discuss my claim.

Apple iPhone Users Targeted with Bogus Dating App for Valentine’s Day

(Friday February 14, 2020)
The scam uses a range of themes, including tech-support scares and slot machines.

Amazon Echo Auto Shenanigans.

(Friday February 14, 2020)

Ovum to Expand Cybersecurity Research Under New Omdia Group

(Friday February 14, 2020)
Informa Tech combines Ovum, Heavy Reading, Tractica, and IHS Markit research.

DHS Warns of Cyber Heartbreak

(Friday February 14, 2020)
Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine's Day.

Bluetooth bugs – researchers find 10 “Sweyntooth” security holes

(Friday February 14, 2020)
More trouble in the Internet of Things - Bluetooth firmware code in many devices is found to have numerous bugs.

SMS Phishing Campaign Targets Mobile Bank App Users in North America

(Friday February 14, 2020)
Customers of RBC, HSBC, TD, Meridian, BNC and Chase are targeted in latest attack.

News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

(Friday February 14, 2020)
Top stories of this week include a new Emotet Wi-Fi hack and Robbinhood ransomware operators using a "bring your own bug" technique.

Debian Security Advisory 4623-1

(Friday February 14, 2020)
Debian Linux Security Advisory 4623-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks.

Slackware Security Advisory - mozilla-thunderbird Updates

(Friday February 14, 2020)
Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.2 and -current to fix security issues.

Ubuntu Security Notice USN-4278-1

(Friday February 14, 2020)
Ubuntu Security Notice 4278-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, conduct cross-site scripting attacks, or execute arbitrary code.

EnumJavaLibs Java Classpath Enumerator

(Friday February 14, 2020)
EnumJavaLibs is a tool that can be used to discover which libraries are loaded (i.e. available on the classpath) by a remote Java application when it supports deserialization.

CA Unified Infrastructure Management Command Execution

(Friday February 14, 2020)
CA Technologies, A Broadcom Company, is alerting customers to three vulnerabilities in CA Unified Infrastructure Management (Nimsoft / UIM). Multiple vulnerabilities exist that can allow an unauthenticated remote attacker to execute arbitrary code or commands, read from or write to systems, or conduct denial of service attacks. CA published solutions to address these vulnerabilities and recommends that all affected customers implement these solutions. The first vulnerability, CVE-2020-8010, occurs due to improper ACL handling. A remote attacker can execute commands, read from, or write to the...

SprintWork 2.3.1 Local Privilege Escalation

(Friday February 14, 2020)
SprintWork version 2.3.1 suffers from a local privilege escalation vulnerability.

Debian Security Advisory 4622-1

(Friday February 14, 2020)
Debian Linux Security Advisory 4622-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks.

The 5 Love Languages of Cybersecurity

(Friday February 14, 2020)
When it comes to building buy-in from the business, all cybersecurity needs is love -- especially when it comes to communication.

The R.A.T In The Shell

(Friday February 14, 2020)
This whitepaper is an analysis of the breach into the Kudankulam Nuclear Power Plant through the lens of Cyber Kill Chain, the study of remote access trojans, and the targeting of critical infrastructure.

Email Fraudsters Trick Puerto Rico’s Government into Wiring $2.6 Million to Bogus Accounts

(Friday February 14, 2020)
Email Fraudsters Trick Puerto Rico’s Government into Wiring $2.6 Million to Bogus Accounts[Email Fraudsters Trick Puerto Rico’s Government into Wiring $2.6 Million to Bogus Accounts]Thieves managed to trick the Puerto Rico government into making $2.6 million worth of payments to the wrong recipient in an elaborate phishing scheme. Tricking local government officials into making payments to bogus accounts is not as uncommon as you might think. It’s usually done through a targeted phishing campaign. The right precautions should make […]

Slackware Security Advisory - mozilla-firefox Updates

(Friday February 14, 2020)
Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.2 and -current to fix security issues.

EPSON EasyMP Network Projection 2.81 Unquoted Service Path

(Friday February 14, 2020)
EPSON EasyMP Network Projection version 2.81 suffers from an unquoted service path vulnerability.

Red Hat Security Advisory 2020-0509-01

(Friday February 14, 2020)
Red Hat Security Advisory 2020-0509-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2020-0498-01

(Friday February 14, 2020)
Red Hat Security Advisory 2020-0498-01 - The org.ovirt.engine-root is a core component of oVirt. Issues addressed include cross site scripting and null pointer vulnerabilities.

HomeGuard Pro 9.3.1 Insecure Folder Permissions

(Friday February 14, 2020)
HomeGuard Pro version 9.3.1 suffers from an insecure folder permission vulnerability.

phpMyChat Plus 1.98 SQL Injection

(Friday February 14, 2020)
phpMyChat Plus version 1.98 suffers from a remote SQL injection vulnerability.

SWAPGS Attack Proof Of Concept

(Friday February 14, 2020)
SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel.

dsniff Download – Tools for Network Auditing & Password Sniffing

(Friday February 14, 2020)
dsniff Download – Tools for Network Auditing & Password SniffingDsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network for interesting data (passwords, e-mail, files, etc.). ARPspoof, DNSspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.

F-SECURE Generic Malformed Container Bypass

(Friday February 14, 2020)
The F-SECURE parsing engine supports the RAR Archive. The parsing engine can be bypassed by specifically manipulating a RAR archive. Various products are affected.

Nedbank Says 1.7 Million Affected By Breach

(Friday February 14, 2020)

Google Blocked 790,000 Apps from the Play Store in 2019

(Friday February 14, 2020)
Google is fighting an uphill battle when it comes to dangerous apps that try to work their way into the Android ecosystem, and the company prevented 790,000 dangerous apps from being published on the Play Store in 2019 alone. The app ecosystem remains the primary means for malware to attack mobile devices, and bad actors […]

Securing the Boot Process

(Friday February 14, 2020)

Hackers Can Seize Control of Ballots Cast Using the Voatz Voting App, Researchers Say

(Friday February 14, 2020)
Flaws in the blockchain app some states plan to use in the 2020 election allow bad actors to alter or cancel someone’s vote or expose their private info.

Shodan Hacking Guide

(Friday February 14, 2020)
DELVING DEEP INTO SHODAN’S MINE 1.1kSHARES Share Shodan is a tool for searching devices connected to the internet. Unlike search engines which help you find websites, Shodan helps you find information about desktops, servers, IoT devices, and more. This information includes metadata such as the software running on each device. Common uses of Shodan include NETWORK SECURITY, MARKET RESEARCH, CYBER RISK, SCANNING IOT DEVICES, and TRACKING RANSOMWARE. This guide will focus on comprehensively...

Cookie-nabbing app could have served users side helping of XSS

(Friday February 14, 2020)
A popular GDPR compliance WordPress plugin vendor has patched a flaw that rendered both site visitors and admins vulnerable to XSS attacks.

CVE-2020-0618: RCE in SQL Server Reporting Services (SSRS)

(Friday February 14, 2020)
14/02/2020 | Author: Admin [CVE-2020-0618: RCE in SQL Server Reporting Services (SSRS)] SQL Server Reporting Services (SSRS) provides a set of on-premises tools and services that create, deploy, and manage mobile and paginated reports. Functionality within the SSRS web application allowed low privileged user accounts to run code on the server by exploiting a deserialisation issue. Although the application was only accessible to authorised users, the lowest privilege (the _Browser_ role) was...

Suspect who refused to decrypt hard drives released after four years

(Friday February 14, 2020)
The US Court of Appeals ruled that he couldn't continue to be held for refusing to give up his passcodes.

Facebook ices in-app dating in EU after questions from regulator

(Friday February 14, 2020)
The app's rollout in the EU has been delayed until Facebook can show privacy regulators its data protection workings.

Self-driving car dataset missing labels for pedestrians, cyclists

(Friday February 14, 2020)
Udacity Dataset 2, used to train thousands of engineers, contained thousands of unlabeled vehicles and hundreds of unlabeled pedestrians.

U.S. Charges Huawei with Stealing Trade Secrets from 6 Companies

(Friday February 14, 2020)
The US Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) charged Huawei with racketeering and conspiring to steal trade secrets from six US firms, in a significant escalation of a lawsuit against the Chinese telecom giant that began last year. Accusing Huawei and its affiliates of "using fraud and deception to misappropriate sophisticated technology from US

OpenSSH release (8.2) with FIDO/U2F support

(Friday February 14, 2020)
OpenSSH 8.2 was released on 2020-02-14. It is available from the SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at: ========================= It is now possible[1] to perform chosen-prefix attacks against the SHA-1...

The CSO guide to top security conferences, 2020

(Friday February 14, 2020)
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts. Fortunately, plenty of great conferences are coming up in the months ahead. If keeping abreast of security trends and evolving threats is critical to your job — and we know it is — then attending some top-notch security conferences is on your must-do list for 2020. From major events to those that are more narrowly focused, this list from the editors...

New Phishing Scam Lures iPhone Owners with Romantic Chat, Gambling, ‘Free’ VPN

(Friday February 14, 2020)
Bitdefender this week has detected a new phishing campaign targeting iPhone owners with a range of scams aiming to defraud unsuspecting victims. First things first. If you receive the email pictured below, steer clear! Don’t open if it’s marked as spam. If it arrives as legitimate, don’t click on any link inside! That includes the […]

Students’ Data left Unprotected by International Education Body

(Friday February 14, 2020)
The Institute of International Education (IIE), a century-old educational organisation that operates numerous leading international scholarship and fellowship programmes across multiple countries, was detected to have left sections of its database unprotected and open to public search. The vulnerable database was detected by security researcher Bob Diachenko, who found the databases indexed in public domain on […] The post Students’ Data left Unprotected by International Education Body [https://www.itsecurityguru.org/2020/02/14/students-data-left-unprotected-by-international-education-bo

Third-Party Bot Exposes Thousands of Instagram Accounts

(Friday February 14, 2020)
An Instagram password leak that has exposed about 10,000 scraped user accounts stems from a popular “bot” app used to automatically grow a following on the platform. The app SocialCaptain stored Instagram usernames and passwords in plaintext, visible by viewing the source code of the app’s profile page. Source: CPO Magazine The post Third-Party Bot Exposes Thousands of Instagram Accounts [https://www.itsecurityguru.org/2020/02/14/third-party-bot-exposes-thousands-of-instagram-accounts/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

700K Sites Affected by WordPress Plugin Bug

(Friday February 14, 2020)
Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible. A popular WordPress plugin, which helps make websites compliant with the General Data Protection Regulation (GDPR), has issued fixes for a critical flaw. If exploited, the vulnerability could enable attackers to modify content or inject malicious JavaScript code […] The post 700K Sites Affected by WordPress Plugin Bug [https://www.itsecurityguru.org/2020/02/14/700k-sites-affected-by-wordpress-plugin-bug/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

Loda RAT phishing Campaign Targets Americas

(Friday February 14, 2020)
Researchers have observed a new malware campaign that’s been targeting the U.S., Argentina, Brazil and Costa Rica with an updated variant of the Loda RAT remote access trojan. In a company blog post on Wednesday, Cisco Talos said that since at least the last quarter of 2019, the campaign has been using malicious websites to host malicious documents that […] The post Loda RAT phishing Campaign Targets Americas [https://www.itsecurityguru.org/2020/02/14/loda-rat-phishing-campaign-targets-americas/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

Malware Security Breach Disclosed by Rutter’s

(Friday February 14, 2020)
US store chain Rutter’s disclosed a security breach today. The company says hackers gained access to its stores’ network system and planted malware that collected payment card details as they were being processed. Stores in Pennsylvania and West Virginia were impacted, Rutter’s said today in a press release and a notice posted on its website. Source: ZD Net The post Malware Security Breach Disclosed by Rutter’s [https://www.itsecurityguru.org/2020/02/14/malware-security-breach-disclosed-by-rutters/] appeared first on IT Security Guru [https://www.itsecurityguru.org].

HTTP DoS / DDoS Tools User Manual

(Friday February 14, 2020)
This whitepaper acts as a user manual to go over HTTP DoS and DDoS tooling. Written in Turkish.