SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
“Cerberus” Android banking Trojan is now able to steal and exploit Google Authenticator’s one-time passcodes (OTP); these codes are generated for two-factor authentication (2FA) of many accounts. Google Authenticator app was launched in 2010 as the more secure alternative for SMS Authentication codes. The app works by providing six to eight-digits unique codes that users…
The number of stalkerware attacks increased by half, rising from 40,386 in 2018, to 67,500 in December 2019, according to Kaspersky “Mobile malware evolution 2019” report. Stalkerware apps, mostly free, could be downloaded from Google play but Google decided to remove apps with stalking features at the end of 2018, however, the numbers still increased…
DoppelPaymer-operatörerna har lanserat webbplatsen “Dopple” för att läcka stulen information om offren som vägrar att betala en lösesumma. Operatörerna säger att de har skapat den här webbplatsen för att hota offren. Om de vägrar att betala kommer information såsom namn och viktiga företagsdata att läcka ut på webbplatsen. Operatörerna hävdar att webbplatsen för närvarande är…
ESET Research threat hunters Miloš Čermák, Robert Lipovský and Štefan Svorenčík disclosed a serious vulnerability called Kr00k at RSA Conference 2020 in San Francisco. The vulnerability in Wi-Fi chips affects billions of devices worldwide and allows attackers to eavesdrop on Wi-Fi communications. The bug (CVE-2019-15126) stems from the use of an all-zero encryption key in chips…
Trend Micro’s Zero Day Initiative (ZDI) informed this week that a major security flaw affecting every single supported version of Microsoft Exchange Server leaves attackers the ability to divulge or falsify corporate email communications at will. Attackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable to the CVE-2020-0688 remote code execution vulnerability patched by…
The pasteboard on iPhones and iPads are open to exploitation by “malicious” apps on those devices to “steal” any data copied to the clipboard. Any cut-and-paste data temporarily stored on an iPhone or iPad’s memory can be accessed by all apps installed on the specific device, even malicious ones. The copy and paste function opens…
ObliqueRAT, a new remote access Trojan (RAT), is delivered to targeted organizations in southeast Asia via malicious Microsoft Office documents (maldocs), Cisco Talos says. Cisco Talos researchers have discovered a new malicious RAT tracked as ObliqueRAT which seems to be developed to attack government organizations and diplomatic targets particularly organizations in southeast Asia. The ongoing…
Zebrocy is a Russian APT that shares similarities and overlaps with both the Sofacy and BlackEnergy APTs. Recently “Zebrocy spearphished a fairly long list of targets throughout the world with a new Nim downloader,” according to Kaspersky Lab researchers. This rule can detect Zebrocy based on its behavior and some IOC containing hash, IP and…
DoppelPaymer operators have launched “Dopple” website to leak the stolen information of victims who refuse to pay a ransom. The operators said they have created this website to threaten victims that if they refuse to pay their information such as their names and important corporate data will be leaked on the site. The operators claim…
Google issued a Chrome update to address three security holes. The Chrome 80 update (version 80.0.3987.122) included a patch for a zero-day vulnerability (CVE-2020-6418) that has been actively exploited in the wild. The CVE-2020-6418 vulnerability is a type of confusion issue and has a severity rating of high that affects the V8 open-source JavaScript engine…