Attackers Host Phishing Pages on Azure

Researchers have recently seen phishing attacks against Office 365 users wherein fake log-in pages were hosted on Microsoft Azure to give them more credibility. According to researchers from security firm EdgeWave, the rogue emails claim to be from Mi… Continue reading Attackers Host Phishing Pages on Azure

Cyberespionage Group Abuses LoJack Theft Recovery Software

Security researchers have found instances of the Absolute LoJack theft recovery technology phoning back to servers associated with a notorious Russian cyberespionage group known as Fancy Bear. Absolute LoJack, previously known as Computrace, is a high… Continue reading Cyberespionage Group Abuses LoJack Theft Recovery Software

Widely Used WebEx Clients Have Critical Vulnerability

Cisco Systems has released security updates for the software clients installed by users who attend WebEx-based meetings to fix a critical vulnerability that could allow remote attackers to compromise their computers. “An attacker could exploit t… Continue reading Widely Used WebEx Clients Have Critical Vulnerability

Attackers Inject Persistent Cryptomining in Browsers

Attackers have found a new technique to make cryptocurrency mining, or cryptomining, inside browsers persistent, or at least survive normal attempts of closing the browser window. Drive-by cryptomining has become widespread in recent months with websit… Continue reading Attackers Inject Persistent Cryptomining in Browsers

Attackers Inject Persistent Cryptomining in Browsers

Attackers have found a new technique to make cryptocurrency mining, or cryptomining, inside browsers persistent, or at least survive normal attempts of closing the browser window. Drive-by cryptomining has become widespread in recent months with websit… Continue reading Attackers Inject Persistent Cryptomining in Browsers