Old Phantom Crypter upends malicious document tools

Credit to Author: Gabor Szappanos| Date: Thu, 14 Feb 2019 15:10:42 +0000

As the new year began, the makers of tools that generate the malicious documents used in social engineering spam attacks threw out the rule book and started fresh with an entirely new batch of Office exploits<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/l3gQLk92YYk” height=”1″ width=”1″ alt=””/>

Read more

DHCP, Edge, Office, Hyper-V Receive Critical New Year Updates

Credit to Author: Andrew Brandt| Date: Mon, 28 Jan 2019 17:30:52 +0000

Just connecting to a (malicious) wireless network could lead to Bad Things Happening, but none of the patched bugs have been seen in the wild (yet!)<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/a-RO7S2VeRA” height=”1″ width=”1″ alt=””/>

Read more

Sophisticated Android clickfraud apps pose as iPhone apps and devices

Credit to Author: Chen Yu| Date: Thu, 06 Dec 2018 14:00:54 +0000

A collection of Android apps exhibit novel and innovative advertising fraud capabilities<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/aL1P_42frkM” height=”1″ width=”1″ alt=””/>

Read more

Chalubo botnet wants to DDoS from your server or IoT device

Credit to Author: Tim Easton| Date: Mon, 22 Oct 2018 22:01:38 +0000

Attackers using brute-force SSH attacks have started to distribute a new bot that engages in coordinated denial-of-service attacks<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/gH8Nr4BLEcA” height=”1″ width=”1″ alt=””/>

Read more

Fake Android banking apps target victims in India

Credit to Author: Pankaj Kohli| Date: Mon, 22 Oct 2018 03:30:48 +0000

Deceptive malware may have stolen thousands of Indian subcontinental bank customers’ account data or credit card numbers<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/VjeP8v3qZxE” height=”1″ width=”1″ alt=””/>

Read more

The price of a cheap mobile phone may include your privacy

Credit to Author: Chen Yu| Date: Tue, 02 Oct 2018 15:00:28 +0000

Inexpensive mobile phones may be subject to “supply chain compromise,” with Trojaned third party apps. We look at a phone that shipped with factory-installed malware<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/9yo1mhq-MZc” height=”1″ width=”1″ alt=””/>

Read more