atsnw_wp, Author at Assured Technology Solutions - Page 63 of 138
Call Us Today at: 503-850-3055

Archive

Beware Of New Backdoor Malware Targeting Linux Users

Beware Of New Backdoor Malware Targeting Linux Users

May 31, 2022BlogComments Off on Beware Of New Backdoor Malware Targeting Linux Users

The name Kevin Beaumont may not be familiar to you, but if you're a Linux or Solaris user, he may have just saved you a whole lot of grief. Recently, Mr. Beaumont discovered a stealthy backdoor malware that has been quietly infecting Linux and Solaris SPARC systems for more than five years.  BPFdoor only parses ICMP, UDP and TCP packets...

Read More

New Phishing Scams Using Twitter Account Emails

New Phishing Scams Using Twitter Account Emails

May 30, 2022BlogComments Off on New Phishing Scams Using Twitter Account Emails

Hackers around the world are increasingly targeting verified Twitter accounts with emails designed to pilfer your Twitter login credentials. Verified Twitter accounts differ from standard Twitter accounts in that they sport a large blue check mark next to the user's name, which indicates that the person who owns the account is someone of considerable influence on the platform. To be...

Read More

Tricky Ransomware Encrypts Small Data But Overwrites Large Data

Tricky Ransomware Encrypts Small Data But Overwrites Large Data

May 28, 2022BlogComments Off on Tricky Ransomware Encrypts Small Data But Overwrites Large Data

The MalwareHunter Team recently discovered a new ransomware operation that is particularly nasty.  Called Onyx, outwardly, the operation does what most ransomware campaigns do.  It gets inside a corporate network, exfiltrates the data that it wants, then seems to encrypt the rest, and then threatens to release the files to the broader public unless their demands for payment are met....

Read More

Popular Service Being Used To Send Phishing Emails

Popular Service Being Used To Send Phishing Emails

May 27, 2022BlogComments Off on Popular Service Being Used To Send Phishing Emails

Google SMTP relay service is wildly popular and used every day by legions of users.  Unfortunately, hackers around the world are aware of this and increasingly they've begun abusing the SMTP relay service. The basic idea is as follows. Some clever hackers have figured out that they can bypass email security products and deliver malicious emails to their intended targets...

Read More

Microsoft’s Edge Browser To Release New Features

Microsoft’s Edge Browser To Release New Features

May 26, 2022BlogComments Off on Microsoft’s Edge Browser To Release New Features

Microsoft recently re-reinvented its web browser. After finally giving up on bug-plagued Internet Explorer, the company introduced Microsoft Edge, which it hoped would take the internet community by storm. When that didn't happen, they re-introduced Edge, this time as a Chromium-based browser, which essentially made it a Google Chrome clone. The company is clearly not thrilled with that. Since the...

Read More

Security Warnings Coming To Certain Google Apps To Help Users

Security Warnings Coming To Certain Google Apps To Help Users

May 26, 2022BlogComments Off on Security Warnings Coming To Certain Google Apps To Help Users

Google has been making some fantastic changes to bolster user security in recent weeks. That includes changes to their Google Play Store that will require developers to disclose exactly what data they plan to track and collect when users install the apps they create. In a related vein, the tech giant has also recently added some powerful new security features...

Read More

Three Big Companies Working On Passwordless Login Options

Three Big Companies Working On Passwordless Login Options

May 25, 2022BlogComments Off on Three Big Companies Working On Passwordless Login Options

Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks. Despite years of training, re-training, and near-constant reminders to strengthen passwords, users keep making the same mistakes. They'll re-use the same password across multiple properties. They may use an incredibly weak...

Read More

New Delivery Method For Ransomware Discovered Called Bumblebee

New Delivery Method For Ransomware Discovered Called Bumblebee

May 24, 2022BlogComments Off on New Delivery Method For Ransomware Discovered Called Bumblebee

Some interesting and disturbing changes are afoot in the hacking world.  It appears that the TrickBot gang is now working for the Conti Syndicate. TrickBot is a well-known group of botnet developers responsible for the creation of the BazarLoader. BazarLoader has been used by Conti in the past as their delivery system of choice when it comes to delivering ransomware...

Read More

Microsoft Edge Browser To Get Free Limited VPN

Microsoft Edge Browser To Get Free Limited VPN

May 23, 2022BlogComments Off on Microsoft Edge Browser To Get Free Limited VPN

There's a big change coming to the Microsoft Edge browser.  Big enough that it may prompt some users to switch to Edge. Recently, Microsoft announced that they'll be adding a free built-in VPN (Virtual Private Network) service to Edge as part of a long-anticipated security upgrade.  Called "Edge Secure Network," the Redmond giant is currently testing the new Cloudflare-powered VPN...

Read More

Many IOT Devices At Risk Due To DNS Vulnerability

Many IOT Devices At Risk Due To DNS Vulnerability

May 21, 2022BlogComments Off on Many IOT Devices At Risk Due To DNS Vulnerability

How many "smart" devices do you have connected to your home or company network?  It's probably a higher number than you originally estimated.  However large that number is, it pays to be aware that IoT devices are some of the least secure devices available on the market today, which makes them the weakest link in terms of hackers successfully attacking...

Read More