Beware!! 15 Billion Stolen Username & Passwords for Sale On the Dark Web

From gbhackers.com

15 Billion Stolen Credentials

New research indicates that more than 15 billion username and passwords are circulated on the dark web. This exposed credentials would result in account compromise.

Account Takeover (known as ATO) is a malicious activity in which attackers take over legitimate user’s online accounts.

We rely on passwords to safeguard our online sensitive data such as our financial documents, personal information, and other sensitive documents.

Read more…

Exchange servers are under attack: patch them without delay

From pandasecurity.com

Cyber-incidents that stem from security vulnerabilities have always been, and still are, a major cyber-security issue. Notable cyber-attacks that have exploited vulnerabilities include WannaCry, the Equifax data breach, and Stuxnet, among many others.

There is a tendency to believe that zero-day vulnerabilities represent the greatest threat, as victims are unaware of the danger, yet this is far from true. More than 90 percent of successful attacks could have been avoided simply by patching software.

Read more…

Ethical hackers predict more attacks coming against government sites

From mexiconewsdaily.com

The Condusef website after it was hacked by Anonymous.The Condusef website after it was hacked by Anonymous.The Condusef website after it was hacked by Anonymous.

After targeting the central bank and a government agency this week, the hackers collective Anonymous México is predicted to carry out more cyberattacks in the coming days.

Ethical hackers – people who hack into a computer network to evaluate its security rather than with malicious or criminal intent – who spoke with the newspaper El Financiero said that Anonymous México has a list of federal government and private company websites that it plans to attack.

Read more…

tsunami-security-scanner: general purpose network security scanner

From securityonline.info

When security vulnerabilities or misconfigurations are actively exploited by attackers, organizations need to react quickly in order to protect potentially vulnerable assets. As attackers increasingly invest in automation, the time window to react to a newly released, high severity vulnerability is usually measured in hours. This poses a significant challenge for large organizations with thousands or even millions of internet-connected systems. In such hyperscale environments, security vulnerabilities must be detected and ideally remediated in a fully automated fashion. To do so, information security teams need to have the ability to implement and roll out detectors for novel security issues at scale in a very short amount of time. Furthermore, it is important that the detection quality is consistently very high. To solve these challenges, we created Tsunami – an extensible network scanning engine for detecting high severity vulnerabilities with high confidence in an unauthenticated manner.

Read more…

Conti ransomware uses 32 simultaneous CPU threads for blazing-fast encryption

From zdnet.com

lock-encryption-ransomware.png

A lesser-known ransomware strain known as Conti is using up to 32 simultaneous CPU threads to encrypt files on infected computers for blazing-fast encryption speeds, security researchers from Carbon Black said in a report on Wednesday.

Conti is just the latest in a long string of ransomware strains that have been spotted this year. Just like most ransomware families today, Conti was designed to be directly controlled by an adversary, rather than execute automatically by itself.

Read more…

Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service

From thehackernews.com

microsoft linux forensics rootkit scanner

Microsoft has announced a new free-to-use initiative aimed at uncovering forensic evidence of sabotage on Linux systems, including rootkits and intrusive malware that may otherwise go undetected.

The cloud offering, dubbed Project Freta, is a snapshot-based memory forensic mechanism that aims to provide automated full-system volatile memory inspection of virtual machine (VM) snapshots, with capabilities to spot malicious software, kernel rootkits, and other stealthy malware techniques such as process hiding.

Read more…

Citrix Issues Critical Patches for 11 New Flaws Affecting Multiple Products

From thehackernews.com

citrix software

Citrix yesterday issued new security patches for as many as 11 security flaws that affect its Citrix Application Delivery Controller (ADC), Gateway, and SD-WAN WAN Optimization edition (WANOP) networking products.

Successful exploitation of these critical flaws could let unauthenticated attackers perform code injection, information disclosure, and even denial-of-service attacks against the gateway or the authentication virtual servers.

Read more…