Spike in Remote Work Leads to 40% Increase in RDP Exposure to Hackers

As Covid-19 continues to wreak havoc globally, companies are keeping their employees at home. To ensure compliance and stay atop security standards, teleworkers have to patch into their company’s infrastructure using remote desktop protocol (RDP)… Continue reading Spike in Remote Work Leads to 40% Increase in RDP Exposure to Hackers

ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates

Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket. Continue reading ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

Bitdefender researchers recently found threat actors abusing a legitimate feature in the RDP service to act as a fileless attack technique, dropping a multi-purpose off-the-shelf tool for device fingerprinting and for planting malware payloads ranging … Continue reading RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

BlueKeep Attacks Have Arrived, Are Initially Underwhelming

The first attacks that exploit the zero-day Windows vulnerability install cryptominers and scan for targets rather than a worm with WannaCry potential. Continue reading BlueKeep Attacks Have Arrived, Are Initially Underwhelming

4 New BlueKeep-like ‘Wormable’ Windows Remote Desktop Flaws Discovered

If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately.

Windows operating system contains four new critical wormable, remote code execution vulnerabili… Continue reading 4 New BlueKeep-like ‘Wormable’ Windows Remote Desktop Flaws Discovered

Top 5 Configuration Mistakes That Create Field Days for Hackers

Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices. Continue reading Top 5 Configuration Mistakes That Create Field Days for Hackers

Remote Desktop Protocol Clients Rife with Remote Code-Execution Flaws

Several flaws in both open-source RDP clients and in Microsoft’s own proprietary client make it possible for a malicious RDP server to infect a client computer – which could then allow for an intrusion into the IT network as a whole. Continue reading Remote Desktop Protocol Clients Rife with Remote Code-Execution Flaws

North Korean APT Group Targets Academia via Malicious Chrome Extensions

Security researchers have uncovered an APT group with possible ties to North Korea that has targeted academic institutions since May. The group, dubbed Stolen Pencil by researchers from Netscout, send spear-phishing emails which direct users to a webs… Continue reading North Korean APT Group Targets Academia via Malicious Chrome Extensions

Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Security researchers have uncovered a new botnet targeting Linux-based devices that’s more sophisticated than Mirai and most other IoT botnets observed so far. Researchers from antivirus vendor Avast have dubbed the new botnet Torii because its … Continue reading Sophisticated IoT Botnet Torii Uses 6 Persistence Methods