“Hacker group Fancy Bear uses backdoor Zebrocy in attacks.
Security researchers at ESET's R&D center in Montreal have discovered how the well-known hacker group Fancy Bear - also known as Sednit, APT28, Sofacy and STRONTIUM - operates. According to the investigators, the hackers use a back door called Zebrocy.
The Advanced Persistent Threat (APT) group... Read more
Ancient Ramnit-trojan refocuses arrows on financial institutions
According to security company F5 Labs, the Ramnit Trojan has refocused its efforts on the financial sector. The Trojan also had this sector in mind at first, but later focused much more on e-commerce.
F5 Labs says it has seen a strong increase in malware in February and March. According to the comp... Read more
Google saved some G Suite passwords as plaintext
Google accidentally stored some of the passwords of G Suite users as plaintext. The error that caused this hit, according to the internet giant, a "small percentage of G Suite users", reports Wired. The functions with the error are now disabled.
Google normally stores passwords on its servers in a ... Read more
Veeam makes enterprise-level disaster recovery available to all businesses
Veeam Software makes its new Availability Orchestrator v2 widely available. The new version should extend the powerful orchestration and automation capabilities to a broader set of applications and virtual machines.
With these more extensive possibilities, organizations should be helped to deal wit... Read more
Hackers steal data from 113,000 other hackers
A group of hackers has attacked a popular forum among a community of its rivals. Nearly 113,000 forum users - including email addresses, hacked passwords, IP addresses and private messages - were stolen.
This is the OGUser.com forum, knows IT Pro. That forum is popular among a community of cybercrim... Read more
Microsoft brings “not to crack” passwords to Azure AD
Microsoft Azure has raised the character limit for passwords in Azure Active Directory (AD) from 16 to 256 characters. This makes it a lot harder to make brute force hacking attempts succeed.
"Many of you have reminded us that we still had a password limit of 16 characters for accounts created in ... Read more
Google’s “Extremely Secure” Titan Security Key contains security flaw
Google's Titan Security Key has been found to contain a security error. The security keys have an incorrectly configured protocol for pairing with Bluetooth. This allows attackers to bypass encryption and take over user accounts.
Google revealed the error itself, writes Cloud Pro. If users try to lo... Read more
European Union can take action against cybercriminals
The European Union has agreed to new regulations that will allow action to be taken against individuals responsible for cyber-attacks that pose a significant threat to the Union.
The European Union can impose travel bans and freeze the assets of these people, writes Bloomberg. The new rules came in... Read more
Stack Overflow victim of hack, customer data not affected
Stack Overflow, the website where developers can share their knowledge and ask questions, was the victim of a hack last weekend. The company states that user data has not been compromised. That's what TechCrunch reports.
Mary Ferguson, vice president of engineering, announced in a very short message... Read more
LogRhythm makes cloud version of NextGen SIEM platform
Security company LogRythm has launched a cloud version of its NextGen SIEM platform. It's LogRythm Cloud, which collects and analyzes billions of security events and threat indicators every week, enabling Security Operations Centers (SOC) to detect and neutralize advanced threats.
LogRythm Cloud use... Read more