By Tom Spring

A proof-of-concept attack demonstrates how adversaries can abuse Microsoft’s Active Directory Federation Services framework to go unnoticed and assume multiple user identities. …read more

Source:: Threat Post


Print pagePDF pageEmail page

By Kevin Townsend

Enigma Software, supplier of software known as SpyHunter, has a notice on its website: “Malwarebytes Inc., the maker of Malwarebytes Anti-Malware (“MBAM”) and AdwCleaner, is intentionally blocking SpyHunter and RegHunter for what we believe are competitive reasons… We have taken legal action against Malwarebytes and are seeking remedies for this unfair conduct.”

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

…read more

Source:: Cisco


Print pagePDF pageEmail page

…read more

Source:: Cisco


Print pagePDF pageEmail page

…read more

Source:: Cisco


Print pagePDF pageEmail page

By l33tdawg Pixel won’t get KRACK fix until December, but is that really a big deal?
l33tdawg
Fri, 11/10/2017 – 22:40 …read more

Source:: hitb


Print pagePDF pageEmail page

By l33tdawg The Pentagon Opened Up to Hackers—And Fixed Thousands of Bugs
l33tdawg
Fri, 11/10/2017 – 22:39 …read more

Source:: hitb


Print pagePDF pageEmail page

By Eduard Kovacs

Several popular antivirus products are affected by a type of vulnerability that allows an attacker to escalate privileges on a compromised system by abusing the quarantine feature, a researcher warned on Friday.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page

By Tom Spring

IBM’s X-Force Research team reports hackers attacking Brazilian banks are using the Windows scripting tool called AutoIt to reduces the likelihood of antivirus software detection. …read more

Source:: Threat Post


Print pagePDF pageEmail page

By Adam Meyer

As a former CISO and as head of an analyst team at a threat intelligence vendor, I’ve written a lot about cyber threat intelligence – what it is/should be, the different types of threat intel (strategic, operational, tactical), raw intelligence versus finished intel, how it can be used, how threat intel fits into your overall cybersecurity program, and so on.

read more

…read more

Source:: securityweek


Print pagePDF pageEmail page