Sunday, April 23, 2017
united states computer emergency readiness team
Computer Security News

Computer Security News

ransom-payment

38% of Ransomware Attacks On Private Users Result In a Payment

Researchers at Trustlook report that ransomware attacks on regular computer users have frequented. The aftermath is even more concerning, as statistics show that 38% of the victims decide to pay the...
ransomware-attack

CradleCore Ransomware Available as RaaS

Forcepoint security experts have discovered that the creator of the CradleCore ransomware is selling their product on underground forums as a source code.CradleCore is available via the popular lately Ransomware-as-a-Service...
zero-day-alert

Zero-Day Vulnerability Exploited by Dridex Trojan

Proofpoint security experts warn that Dridex banking Trojan exploits the latest Microsoft Office zero-day vulnerability to compromise users’ computers.The zero-day allows hackers to achieve code execution on compromised machines. By using...
windows-zero-day

Microsoft Office Vulnerability Used in Zero-Day Attacks

Reports about an unpatched vulnerability in Microsoft Office have come from both McAfee and FireEye. The cyber security companies warn that the weakness allows hackers to achieve full code execution on...
macOS-device

MacOS Malware Grew by 744% in 2016

Despite being considered as much safer than Windows, macOS gets more and more threatened by malware every day. The latest threat report by McAfee showed that in 2016, the macOS malware...

Apache Struts Bug Exploited to Deliver the Cerber Ransomware

Security experts alert that cybercriminals have been exploiting a recently patched Apache Struts 2 flaw to distribute the Cerber ransomware.The vulnerability, detected as CVE-2017-5638, can be used for remote code execution....

ClearEnergy Ransomware Targets Critical Infrastructure, SCADA and Industrial Control Systems

A new string of ransomware called ClearEnergy was uncovered by researchers at CRITIFENCE Critical Infrastructure and SCADA/ICS Cyber Threats Research Group. The virus works like other infections of this type. It...
NoMoreRansom-tool

NoMoreRansom Adds New Decryption Tools and Partners

A year ago, Europol, the Dutch National Police, Kaspersky Lab and Intel Security, launched a project named NoMoreRansom, and they have just published its latest progress report.What NoMoreRansom does, is...
Anti-Forensics-Tool

WikiLeaks Exposes CIA’s Anti-Forensics Tool

The third set of stolen CIA documents has recently been released. After Year Zero and Dark Matter, WikiLeaks has now opened another vault. Codenamed Marble, the vault contains 676 source code...

POSHSPY Ensures Permanent Access to Targeted Systems

Malware researchers at FireEye branch Mandiant have uncovered an attack pattern, deployed by Russian cyberespionage group APT29. This hacker organization is also known as Cozy Bear, Cozy Duke and The Dukes....