Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal Data

Astaroth Trojan

A new unique campaign abuses system native OS process and security software to steal passwords and personal information. Threat actors disguise the Astaroth Trojan payload as JPEG, GIF, and extensionless to avoid file detections. The campaign especially targets the users in Brazil and the initial infection starts with a phishing-based campaign. Researchers form cybereason observed […]

The post Astaroth Trojan Disguises as JPEG, GIF File Abuses OS and Antivirus Process to Steal Data appeared first on GBHackers On Security.

Read more

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

All these numbers…. “More than 5 billion records from 6,500 data breaches were exposed in 2018” — a report from Risk Based Security says. “More than 59,000 data breaches have been reported across the European since the GDPR came into force in 2018” — a report from DLA Piper says. …came from data breaches that were reported to the public, but in reality, more than half of all data breaches

Read more

How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link

It’s 2019, and just clicking on a specially crafted URL would have allowed an attacker to hack your Facebook account without any further interaction. A security researcher discovered a critical cross-site request forgery (CSRF) vulnerability in the most popular social media platform that could have been allowed attackers to hijack Facebook accounts by simply tricking the targeted users into

Read more

Australia blames ‘state actor’ for hacking political parties – Washington Post

  1. Australia blames ‘state actor’ for hacking political parties  Washington Post
  2. Australian parliament hit by “state actor” hacking  IT PRO
  3. Scott Morrison reveals foreign government hackers targeted Liberal, Labor and National parties in attack on Parliament’s servers  ABC News
  4. Australia’s major political parties targeted by ‘sophisticated state actor’, PM says  The Guardian
  5. View full coverage on Google News
Read more

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

Intrusion Detection System (IDS)

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities such as DDOS Attacks or through security policy violations. An IDS works by monitoring system activity through examining vulnerabilities in the system, the integrity of files […]

The post Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM appeared first on GBHackers On Security.

Read more