Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Cyberpunk 2077 free  ...

 Threats

One of the most eagerly awaited games of the year, Cyberpunk 2077, is set for release in December 2020. As gamers count down the days, scammers are using the window to cash in. We found several websites supposedly giving away Cyberpunk 2077. Alas, visitors are sure to be disappointed, or worse. How the Cyberpunk 2077   show more ...

scam works The websites we found are all very similar, differing mainly by language and corresponding top-level domain. The URLs contain words such as PC, games, and download in the language of the site. One of the fake sites in Italian Website in German, with a large Herunterladen (Download) button If the visitor clicks the button, the site downloads an executable file that appears to be an installer to the computer. Opening it, the user sees a menu with some inactive buttons, creating the illusion that, once installed, the app can be used to run and configure the game. Fake Cyberpunk 2077 installer Three options are active: Install, Support (this button does nothing) and Exit. Clicking Install opens a window that seems to show the game being downloaded and unpacked. The fake installer pretends to download Cyberpunk 2077. Just don’t read it too carefully In fact, the program does nothing but sit for a while, emulating installation progress before asking the user for a license key. No key? No problem. They can get one by clicking the Get License Key button. The installer requests a license key Clicking the button opens another website that offers the user a chance to take a survey or enter a giveaway to get the key. Getting a key means having to take a survey. Note the reviews on the right — also fake The next prompt is a set of unrelated questions, as well as requests for a phone number and e-mail address. That contact information is the likely target of the attack; contact information is useful for spamming. Example of a survey used by scammers In any case, in the end, the user is asked for contact information After receiving all of the answers, the site does provide a key — and it appears to work because it was coded into the fake installer. The game loads, and it looks like fun time may have arrived at last. Well, not quite. The app displays a splash screen but then says it is missing a DLL required to run the game. Fake Cyberpunk 2077 can’t start because a DLL is missing The frustrated user now has to click on another Download button and again is redirected to a Web page with yet another survey (which is a dead end). History repeats itself: Loading the DLL means taking another survey Once again, alas, no pot of gold waits at the end of the rainbow. Patient users will find only a fake installer and a “game” that never gets past the splash screen. Just wait for the real Cyberpunk 2077 Downloading a nongame, wasting time on pointless surveys, and landing in yet another spam database is bad, although not fatal. But similar schemes can be more dangerous. For example, instead of a survey, the cybercriminals might ask for money in exchange for the key. Or instead of a dummy installer, they might provide malware. This year, we already registered several thousand infection attempts through fake Cyberpunk 2077 downloads. Ultimately, no matter how much you’re itching to plunge into the long-awaited game with a digitized Keanu Reeves, you’ll have to wait for the official release. For now, to avoid the clutches of scammers: Remember that if something looks too good to be true, it probably is. A website offering a free version of one of the most anticipated games of the year before the release date is bound to be fake. Think twice before giving any website personal information or payment details. In cases of sites promising access to a coveted file or key, you’ll be wasting your time — or worse. Use a reliable security solution with a database of fraudulent resources that is updated in real time. It will tell you which sites to steer clear of, and it will protect you from malware. Our products detect the sites mentioned in this post with the verdict HEUR:Hoax.Script.FakeGame.gen, and files downloaded from them as HEUR:Hoax.MSIL.FakeGame.gen.

 Govt., Critical Infrastructure

On whether DMARC was "fully implemented", DPS said it wasn't complete yet, but it had the required funds. "Implementation of DMARC is funded as part of DPS' capital budget for 2020-21," the DPS said.

 Feed

Red Hat Security Advisory 2020-5350-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser.

 Feed

Savsoft Quiz version 5 suffers from a persistent cross site scripting vulnerability. This finding differs from the original discovery of persistent cross site scripting in this version found originally by th3d1gger.

 Feed

Gentoo Linux Security Advisory 202012-5 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 87.0.4280.88 are affected.

 Feed

Red Hat Security Advisory 2020-5351-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard.

 Feed

Gentoo Linux Security Advisory 202012-4 - Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to the execution of arbitrary code. Versions less than 78.5.1 are affected.

 Feed

Red Hat Security Advisory 2020-5352-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard.

 Feed

21st-century technology has allowed Cybercriminals to use sophisticated and undetectable methods for malicious activities. In 2020 alone, a survey revealed that 65% of US-based companies were vulnerable to email phishing and impersonation attacks. This calls for upgrading your organization's security with DMARC, which if not implemented, will enable cyber-attackers to: Instigate money transfers

 Feed

A cybercrime group known for targeting e-commerce websites unleashed a "multi-stage malicious campaign" earlier this year designed with an intent to distribute information stealers and JavaScript-based payment skimmers. In a new report published today and shared with The Hacker News, Singapore-based cybersecurity firm Group-IB attributed the operation to the same group that's been linked to a

 Feed

A team of researchers today unveiled previously undisclosed capabilities of an Android spyware implant—developed by a sanctioned Iranian threat actor—that could let attackers spy on private chats from popular instant messaging apps, force Wi-Fi connections, and auto-answer calls from specific numbers for purposes of eavesdropping on conversations. In September, the US Department of the Treasury

 Data loss

One of the world’s leading recruitment agencies has found itself the victim of ransomware. In a statement published on Thursday last week, Randstad said that it had “recently become aware of malicious activity” on its network. That “malicious activity” was the Egregor ransomware, and   show more ...

although Randstad says that its operations have not been compromised by … Continue reading "Recruitment giant Randstad hit by ransomware, sensitive data stolen"

 Data loss

A hacking gang calling itself Black Shadow has demanded a giant insurance firm pay a US $3.8 million ransom after encrypting and stealing sensitive data and documents about its clients. Customers of the victim, Israel’s Shirbit insurance company, have been advised to consider obtaining new identity cards and driving   show more ...

licenses due to the risk of identity theft after the hackers released a third wave of stolen data this past weekend.

 Application Security

The growth of application development, DevOps, containers, and cloud has fueled the growth of application security tools.  We now have static analysis, software composition analysis, interactive analysis, dynamic analysis, container scanning, infrastructure as code scanning, and a number of runtime application   show more ...

security products.  That’s a lot of testing data, but how do we integrate it […] The post Integrating Application Security Testing Data to Drive Better Decisions appeared first on Security Weekly.

2020-12
Aggregator history
Monday, December 07
TUE
WED
THU
FRI
SAT
SUN
MON
DecemberJanuaryFebruary