Day: May 22, 2020

Forget BYOD, this is BYOVM: Ransomware tries to evade antivirus by hiding in a virtual machine on infected systems

Like Inception, but expensive and disappointing. So… just like Inception With antivirus tools increasingly wise to common infection tricks, one group of extortionists has taken the unusual step of stashing their ransomware inside its own virtual machine.… …read more Source:: Register


Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th

Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues… …read more Source:: DarkReading


‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns

Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign. …read more Source:: Threatpost


Home Chef Serves Up Data Breach for 8 Million Records

The meal-kit company’s customer records were leaked as part of the Shiny Hunters breach. …read more Source:: Threatpost


Security & Trust Ratings Proliferate: Is That a Good Thing?

Phishing ratings, security ratings, human-ness ratings — we are looking at a future filled with grades of security and trustworthiness. But there is a downside. …read more Source:: DarkReading


IBM Is Latest Tech Giant To Cut Jobs in Midst of Pandemic

IBM cut an unspecified number of jobs across the U.S., eliminating employees in at least five states. The company declined to comment on the total number, but the workforce reductions appear far-reaching. From a report: “IBM’s work in a highly competitive marketplace requires flexibility to constantly add high-value skills to our workforce. While we always…


Silent Night Zeus Financial Botnet Sold In Underground Forums

…read more Source:: PacketStorm


Docker Desktop For Windows Patches Privilege Escalation

…read more Source:: PacketStorm


Weird Nintendo Switch Issue Makes It Easier To Guess Passwords

…read more Source:: PacketStorm


Nigerian Scattered Canary Gang Exploits CARES Act

…read more Source:: PacketStorm