Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal Data

Astaroth Trojan

A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the Astaroth Trojan payload as JPEG, GIF, and extensionless to avoid file detections. The campaign especially targets the users in Brazil and the initial infection starts with a phishing-based campaign. Researchers form cybereason observed […]

The post Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal Data appeared first on GBHackers On Security.

Read more

Facebook CSRF Bug Leads to Account Takeovers with a Single Click

Would you believe it if we told you that clicking on a single malicious link could hack your Facebook account? The scenario is entirely possible due to a recently uncovered critical cross-site request forgery (CSRF) vulnerability. The flaw could allow…
Read more

The post Facebook CSRF Bug Leads to Account Takeovers with a Single Click appeared first on How to, Technology and PC Security Forum | SensorsTechForum.com.

Read more

7 cheap or free cybersecurity training resources

Scare headlines about the looming cybersecurity skills shortage are a regular feature in the trade press, and occasionally even make it into mainstream publications. If one thing is clear, it’s that companies outbidding each other for a tiny talent pool of security engineers with five to ten years’ experience is not a winning formula to increase the cybersecurity labor force.

To read this article in full, please click here

(Insider Story)

Read more

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

All these numbers…. “More than 5 billion records from 6,500 data breaches were exposed in 2018” — a report from Risk Based Security says. “More than 59,000 data breaches have been reported across the European since the GDPR came into force in 2018” — a report from DLA Piper says. …came from data breaches that were reported to the public, but in reality, more than half of all data breaches

Read more