git reflog is showing plain text password used as a secret texts or files in Jenkins

We are using Jenkins Freestyle Project to push the changes on the remote server. We are executing shell script on remote host using ssh for it. To pull the changes on the remote server, we are using origin url with git username and git pas… Continue reading git reflog is showing plain text password used as a secret texts or files in Jenkins

Remittance Adivce – word doc macro malware leads to #Dridex

Last revised or Updated on: 17th March, 2016, 9:32 AMAn email with the subject of Remittance Adivce  pretending to come from random names and email addresses  with a malicious word doc or Excel XLS spreadsheet attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt. They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. The name of the alleged sender matches the name … Continue reading → Continue reading Remittance Adivce – word doc macro malware leads to #Dridex

Interparcel Documents – word doc macro malware leads to Dridex

Last revised or Updated on: 17th March, 2016, 9:10 AMAn email with the subject of Interparcel Documents pretending to come from Interparcel <bounce@interparcel.com> with a malicious word doc attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt. They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. The email looks like: From: Interparcel <bounce@interparcel.com> Date: none Subject:  Interparcel Documents Attachment: Shipping Labels (642079569307).doc Body … Continue reading → Continue reading Interparcel Documents – word doc macro malware leads to Dridex

RE: MINERAL & FINANCIAL INVESTMENTS LTD – Order Number 89785/682352/15 status updated to order processing – word doc macro malware

Last revised or Updated on: 16th March, 2016, 2:28 PMAn email with the subject of RE: MINERAL & FINANCIAL INVESTMENTS LTD – Order Number 89785/682352/15 status updated to order processing  pretending to come  from random names and email addresses   with a malicious word doc  attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex or Dyreza and ransomware like Locky, cryptolocker or Teslacrypt. They are using email addresses and subjects that will scare or entice a user to read the email and open the attachment. A very high proportion are being targeted at small and medium size businesses, with the hope of getting a better response than they do from consumers. … Continue reading → Continue reading RE: MINERAL & FINANCIAL INVESTMENTS LTD – Order Number 89785/682352/15 status updated to order processing – word doc macro malware