Security News This Week: 15 Billion Stolen Logins Are Circulating on the Dark Web

From wired.com

a gazillion gold keys

AFTER CHINA IMPOSED a restrictive national security law on Hong Kong, tech companies find themselves at a crossroads. Giants like Google and Facebook stopped responding to requests for user data in the city, but may eventually have to pull out altogether.

One marquee name to exit Hong Kong already is TikTok, which remains eager to prove its distance from its China-based parent company. TikTok also found itself embroiled in a confusing episode on Friday, when an internal Amazon email indicated that the company was ordering employees to remove the app from their phones; hours later, Amazon stated that the email was sent in error. Hate it when the drafts go live, especially when they cause an international furor.

Read more…

TrickBot malware mistakenly warns victims that they are infected

From bleepingcomputer.com

TrickBot

The notorious TrickBot malware mistakenly left a test module that is warning victims that they are infected and should contact their administrator.

TrickBot is a malware infection that is commonly distributed via malicious spam emails. When installed, the malware will run quietly on a victim’s machine while it downloads various modules that perform different tasks on the infected computer.

Read more…

Google updates policies to ban any ads for surveillance solutions and services

From securityaffairs.co

Google announced the update of its Google Ads Enabling Dishonest Behavior policy to “prohibit the promotion of products or services that are marketed or targeted with the express purpose of tracking or monitoring another person or their activities without their authorization.” The tech giant announced that the update will be effective starting from August 11, 2020.

The move aims at fighting the advertising of any form of surveillance.

Google wants to halt the use of ads for technology that could allow monitoring a person’s online activity (i.e. access their messages, phone calls, or tracking their position).

“In August 2020, the Google Ads Enabling Dishonest Behavior policy will be updated to clarify restrictions on advertising for spyware and surveillance technology.”reads the post published by Google.

Read more…

pentest: create an pentest environment easily and quickly

From securityonline.info

Features

  • OS, networking, developing and pentesting tools installed.
  • Connection to HTB (Hack the Box) vpn to access HTB machines.
  • Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.
  • Proxy service to send traffic from any browsers and burp suite installed in your local directory.
  • Exploit database installed.
  • Tool for cracking password.
  • Linux enumeration tools installed.
  • Tools installed to discovery services running.
  • Tools installed to directory fuzzing.
  • Monitor for linux processes without root permissions
  • Zsh shell installed.

Read more…

Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online

From gbhackers.com

Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online

is this website safe ? In this digital world, Check website safety is most important concern since there are countless malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy websiteWe need tobrowse smart and need to make sure the site is not dangerous by using Multiple approaches.

In general, it is good to type the website URL instead of copy-paste or clicking an URL. Also, check to see the website working with HTTP OR HTTPS.

Read more…

Threat spotlight: WastedLocker, customized ransomware

From malware.news

WastedLocker is a new ransomware operated by a malware exploitation gang commonly known as the Evil Corp gang. The same gang that is associated with Dridex and BitPaymer.

The attribution is not based on the malware variants as WastedLocker is very different from BitPaymer. What was kept was the ability to add specific modules for different targets.

The attacks performed using WastedLocker are highly targeted at very specific organizations. It is suspected that during a first penetration attempt an assessment of active defenses is made and the next attempt will be specifically designed to circumvent the active security software and other perimeter protection.

Read more…