A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide

Remote job: A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide Cybersecurity researchers today took the wraps off a sophisticated, multi-functional peer-to-peer (P2P) botnet written in Golang that has been actively targeting SSH servers since January 2020. Called “FritzFrog,” the modular, multi-threaded and file-less botnet has breached more than 500 servers to date, infecting well-known universities in the US and Europe, and a railway company, according Source: Hackernews Link: A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide Continue reading A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide

Critical Jenkins Server Vulnerability Could Leak Sensitive Information

Remote job: Critical Jenkins Server Vulnerability Could Leak Sensitive Information Jenkins—a popular open-source automation server software—published an advisory on Monday concerning a critical vulnerability in the Jetty web server that could result in memory corruption and cause confidential information to be disclosed. Tracked as CVE-2019-17638, the flaw has a CVSS rating of 9.4 and impacts Eclipse Jetty versions 9.4.27.v20200227 to 9.4.29.v20200521—a full-featured tool Source: Hackernews Link: Critical Jenkins Server Vulnerability Could Leak Sensitive Information Continue reading Critical Jenkins Server Vulnerability Could Leak Sensitive Information

Researchers Exploited A Bug in Emotet to Stop the Spread of Malware

Remote job: Researchers Exploited A Bug in Emotet to Stop the Spread of Malware Emotet, a notorious email-based malware behind several botnet-driven spam campaigns and ransomware attacks, contained a flaw that allowed cybersecurity researchers to activate a kill-switch and prevent the malware from infecting systems for six months. “Most of the vulnerabilities and exploits that you read about are good news for attackers and bad news for the rest of us,” Binary Defense’s Source: Hackernews Link: Researchers Exploited A Bug in Emotet to Stop the Spread of Malware Continue reading Researchers Exploited A Bug in Emotet to Stop the Spread of Malware

How AppTrana Managed Cloud WAF Tackles Evolving Attacking Techniques

Remote job: How AppTrana Managed Cloud WAF Tackles Evolving Attacking Techniques Web applications suffer continuously evolving attacks, where a web application firewall (WAF) is the first line of defense and a necessary part of organizations’ cybersecurity strategies. WAFs are getting more sophisticated all the time, but as its core protection starts with efficient pattern matching, typically using Regular Expressions, and classifying malicious traffic to block cyber Source: Hackernews Link: How AppTrana Managed Cloud WAF Tackles Evolving Attacking Techniques Continue reading How AppTrana Managed Cloud WAF Tackles Evolving Attacking Techniques

New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls

Remote job: New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls A team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in the 4G LTE and 5G networks—today presented a new attack called ‘ReVoLTE,’ that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The attack doesn’t exploit any flaw in the Voice over LTE (VoLTE) protocol; instead, Source: Hackernews Link: New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls Continue reading New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls

Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely

Remote job: Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely Attention! If you use Amazon’s voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Cybersecurity researchers today disclosed severe security vulnerabilities in Amazon’s Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. <!– adsense — Source: Hackernews Link: Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely Continue reading Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely

319: Chase Dimond Teaches You How To Crisis-Proof Your Email Marketing Strategy

Remote job: 319: Chase Dimond Teaches You How To Crisis-Proof Your Email Marketing Strategy Subscribe to The Foundr Podcast on iTunes, Soundcloud, Stitcher and Spotify Chase Dimond, Founder, Boundless Labs Email marketing is one of the most powerful tools that brands can leverage during the pandemic. With face-to-face interactions still being limited and people spending most of their time at home, there has never been a better time to hit ‘send’ on those email campaigns and flows. To help guide you in the right direction, we sat down with Chase Dimond to get his best recommendations on how to crisis-proof … Continue reading 319: Chase Dimond Teaches You How To Crisis-Proof Your Email Marketing Strategy