via Camille Singleton, writing at SecurityIntelligence, details a report (you will need to create an IBMID. Saving grace: it's free) issued by IBM's XForce, illuminating the rapid increase of Wiper-type destructuve ransomeware attacks. Read It and Weep.
"Destructive malware that disables access to data or destroys system functions has been expanding across geographies and industries over the past few years. Organizations previously thought safe from this form of cyber aggression increasingly find themselves affected, either directly or indirectly." via the IBM XSS IRIS Report" Combating Destructive Malware - Lessons From The Front Lines"
via Threatpost author Lindsey O'Donnell, come this remarkably lucid, well crafted interview piece dissecting the nature of low-hanging fruits, where the fruits under scrutiny are in fact cities themselves, specifically - Atlanta. Ensconced (if you will) in the Peach State... Most certainly Today's Must Read.
Fake Jobs, leading to malware infections, that is. Microsoft Corporation (Nasdaq: MSFT) and it's LinkedIn unit must focus on protecting their product, which of course, are LinkedIn members. Read all about it at Proofpoint and via Graham Cluley writing at BitDefender. H/T
"Since the middle of 2018, Proofpoint has been tracking campaigns abusing legitimate messaging services, offering fake jobs, and repeatedly following up via email to ultimately deliver the More_eggs backdoor." - via the Proofpoint Threat Insight Team, wrtiting at the comapny's blog with the post entitled "Fake Jobs: Campaigns Delivering More_eggs Backdoor via Fake Job Offers"
via Cyrus Farivar, writing at Ars Technica, of the apparent displeasure noted by United States District Court Judge Amy Totenberg, whilst Her Honor viewed the shenanigans being perpertrated by the State of Georgia's voting commision. Suprised? Don't be.. The centuries lomg tradition of election manipulations is coming to the fore, as the aft begins sinking under it's own weight of corruption, down south, that is. That said, the North, West and East aren't exactly doing that much better. Read Cyrus's superb reportage and weep for free, unfettered elections.
MAC users take note, there's evil malware in the wild - and - according to Checkpoint's Ofer Caspi of the highly competent Checkpoint Malware Research Team, the bits in question are not just pernicous, but tenacious as well, and, interestingly, specifically targeting Mac users. Dubbed OSX/Dok it's time to update your virus prophylaxis on your MAC, forthwith.
The OSX/Dok malware is distributed via a phishing campaign, which is usually not a new or surprising attack vector, however this time it targets specifically macOS users, who are mostly perceived as malware-proof. This phishing campaign is combined with a MiTM attack, allowing complete access to all victim communication, even if it’s SSL encrypted. - via Checkpoint's Ofer Caspi - Checkpoint Malware Research Team
Researchers from antivirus provider Eset report finding at least three such apps in the Google-hosted marketplace. - via Dan Goodin writing at ArsTechnica
via the inimitable Dan Goodin and writing at Ars Technica, wherein the good Mr. Goodin, in a display of remarkable restraint, tells the tale of the discovery of code (in this case not 'authorized') making itself at home in Juniper network componentry. In this case, firewall network componentry. Ooops