1. Add 3 new ransomware operators to establish websites for information leakage
- gormsenbladt70hoiw
- Jun 11, 2020
- 4 min read
Since Maze developed its personal 'news' web site to publish data on victims who refused to spend the ransom, other ransomware operators, which include Sodinokibi / REvil, Nemty and DoppelPaymer, have followed swiftly. Now, three other ransomware households happen to be discovered: Nefilim, CLOP, and Sekhmet have also launched data leakage sites. [Foreign Journal-Read Original]
2. HPE warning: Enterprise SSD difficult drive bug, all information is lost right after 40,000 hours of use
Hewlett Packard Enterprise (HPE) warned its buyers once again that some serially connected SCSI solid-state drives will fail just after 40,000 hours of operation, the hard drive will hang, and information will be lost. Unless critical patches are applied. [ how to recover damaged partition table -Read Original]
three. The quantity of income involved exceeded 1 million US dollars, Russia cracked a large-scale network hacking case
On March 24th, local time, the Russian Federal Safety Service released news that the Russian law enforcement authorities recently cracked a large-scale cyber hacking case. A number of strong Russian authorities were also in Moscow, Saint Petersburg, Samara, and Tambov regions. Eleven federal entities initiated arrests and arrested much more than 30 criminals from Russia, Lithuania, and Ukraine. [Read original]
four. India announced a 21-day national blockade and isolation
Indian Prime Minister Narendra Modi announced a strict 21-day blockade across the country beginning at midnight on Tuesday, triggering a wave of panic shopping for frenzy. In his speech, Modi warned that any individual who walked out of your residence could face criminal prosecution. He severely ordered 1.37 billion Indians to keep at residence for the subsequent 21 days. [Read how to recover a partition table gparted ]
5. Basic Electric says a few of its employees have been hit by Canon ’s information breach
Basic Electric (GE) revealed last week that some employees ’personal information and facts might have been compromised on account of information leakage from Canon Enterprise Method Services. At present, Canon has not shared any info about the violations, and it can be unclear whether or not GE may be the only affected consumer. [Foreign Journal-Read Original]
6. http://puffinrelish67.eklablog.com/the-functions-of-widespread-folders-within-the-c-drive-give-your-compu-a189629294 : 10 methods hackers use automation to enhance attacks
Automation is a portion of your method that is certainly familiar to providers to improve method efficiency. But now, cyber criminals and hackers are finding out from small business and are increasingly turning to automation to assist them carry out malicious activities, thereby expanding their organization scale. [Foreign Journal-Read Original]
[Security incident] 1. Critical RCE vulnerability affects millions of OpenWrt-based network devices
A security researcher disclosed a serious remote code execution vulnerability affecting network devices according to the OpenWrtLinux operating system. The vulnerability is named CVE-2020-7982 and exists in OpenWrt's OPKG package manager. [Foreign Journal-Read Original]
two. Safety enterprise finds that kids ’s apps in the Google Play retailer hide malware
Researchers at the well-known cybersecurity enterprise CheckPoint recently discovered that a sizable quantity of utilities and youngsters ’s applications in Google ’s Google Play shop contain hidden auto-click malware, which has been downloaded extra than 1 million instances. Earlier this month, after CheckPoint disclosed the results with the investigation to Google, Google deleted these applications. [Read original]
3. Taobao appeared 'Beta version will expire' pop-up bug, the official response: close the reminder
On March 25th, a large quantity of Weibo netizens reported that following opening the iOS version from the mobile telephone Taobao, a pop-up window bug with an closed beta version will appear. The pop-up window displays: 'The system you will be making use of is really a closed beta version and will be released in 2020 local time. how to recover partition table using gparted will expire on March 28, 2014. It will be unavailable after the expiry. Please download the latest version as soon as possible. 'At present, only Apple phones will crash, and Android phones can nevertheless be employed usually. [Read original]
four. The Baidu SkyDrive Mac version features a strange phenomenon: unmanned operation but automatically downloads games and several components
According to a V2EX netizen post saying that the Baidu SkyDrive Mac version is utilised, there are lots of abnormal files inside the Baidu SkyDrive download folder. These files aren't the user's personal. Following checking the Baidu network disk transfer completion list, it was located that these abnormal files had been downloaded by Baidu network disk, however the strange thing is that the user did not operate the file download request, and in some cases these abnormal files have been not transferred in the user's Baidu network disk. [Read original]
5. In the future, Firefox may force HTTPS hyperlinks to prohibit access to insecure pages
Future versions of Firefox may well introduce HTTPS-only mode, which signifies that access to insecure web-sites is totally blocked. In the most recent version of Firefox76 Nightly launched, Mozilla introduced an experimental feature. If all the things goes properly, it's going to land inside the steady version inside the next handful of months and be open to all customers. [Read original] Tea wholesale
6. Windows 10 cumulative update KB4541335 released: repair the commence menu problem
For Windows ten Version 1903 / Version 1909 function update, Microsoft has released a brand new cumulative update KB4541335, users can manually check for updates through Windows Update. This update does not introduce any new capabilities, primarily to improve the commence menu and file manager. [Read original]
[Quality article] 1. Be wary of counterfeit US CDC sending new crown epidemic mail delivery organization Trojan WarzoneRAT
The hacker forged the US Centers for Disease Control and Prevention (CDC) because the sender and delivered the document with all the Workplace formula editor vulnerability to the target mailbox. The recipient opened around the personal computer with the Office formula editor vulnerability (CVE-2017-11882) The document could trigger a vulnerability to download the industrial remote handle Trojan WarzoneRAT. [Read original]
Tea wholesale two. Interpretation of technical specifications for private monetary information protection
On February 20, 2020, the National Economic Standardization Technical Committee (hereinafter known as the 'Gold Standardization Committee') announced the suggested industry regular 'Personal Economic Data Protection Technical Specification' (hereinafter known as the 'Financial Facts Specification'). The People's Bank of China issued it on February 13, 2020 and implemented it on that day. [Read original]
3. Rethink the current public security and individual privacy on the domestic epidemic from the Apple 'Unlock the Door' incident
When it comes to public safety and private privacy, it is actually indeed a subject that may be generally talked about. As early as the FBI asked Apple to unlock criminals ’mobile phones in 2016, this topic had aroused heated discussion. There isn't any conclusion.
Comments