T-Mobile Investigating Claims of Massive Data Breach

From krebsonsecurity.com

Communications giant T-Mobile said today it is investigating the extent of a breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including the name, Social Security number, address, date of birth, phone number, security PINs and details that uniquely identify each customer’s mobile device.

On Sunday, Vice.com broke the news that someone was selling data on 100 million people, and that the data came from T-Mobile. In a statement published on its website today, the company confirmed it had suffered an intrusion involving “some T-Mobile data,” but said it was too soon in its investigation to know what was stolen and how many customers might be affected.

Read more…

Most employees reusing personal passwords to protect corporate data

From helpnetsecurity.com

employees reusing personal passwords

Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. Surprisingly, 97% of employees know what constitutes a strong password, yet 53% admit to not always using one.

Read more…

Phishing Your Calendar for A Court Date

From cofense.com

It’s no surprise threat actors continue to leverage new tactics to get recipients to interact with their content. Cofense Managed Phishing Defense Center (PDC) actioned a campaign reported by several customers’ well-conditioned users, which was then analyzed by our Cofense Intelligence team. We’ve seen a few of these campaigns in the past several weeks; as long as this tactic yields success, we can expect it to be leveraged to make it to the inbox.

Read more…

New AdLoad Variant Bypasses Apple’s Security Defenses to Target macOS Systems

From thehackernews.com

A new wave of attacks involving a notorious macOS adware family has evolved to leverage around 150 unique samples in the wild in 2021 alone, some of which have slipped past Apple’s on-device malware scanner and even signed by its own notarization service, highlighting the malicious software ongoing attempts to adapt and evade detection.

“AdLoad,” as the malware is known, is one of several widespread adware and bundleware loaders targeting macOS since at least 2017 that’s capable of backdooring an affected system to download and install adware or potentially unwanted programs (PUPs), as well as amass and transmit information about victim machines.

Read more…

The Rise of Deep Learning for Detection and Classification of Malware

From mcafee.com

Figure 1: CNNs on raw bytes for malware detection and classification

Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that extract patterns from data using neural networks. Deep learning has been applied to image segmentation, protein structure, machine translation, speech recognition and robotics. It has outperformed human champions in the game of Go. In recent years, deep learning has been applied to malware analysis. Different types of deep learning algorithms, such as convolutional neural networks (CNN), recurrent neural networks and Feed-Forward networks, have been applied to a variety of use cases in malware analysis using bytes sequence, gray-scale image, structural entropy, API call sequence, HTTP traffic and network behavior.  

Read more…

SynAck ransomware gang releases decryption keys for old victims

From malware.news

key

EXLCUSIVE – The El_Cometa ransomware gang, formerly known as SynAck, has released today master decryption keys for the victims they infected between July 2017 and early 2021.

The leaked keys were provided to The Record earlier today by an individual who identified themselves as a member of the former SynAck group.

Read more…