Tag Archives: Adobe

10Fold- Security Never Sleeps- 128

Here’s The Evidence Russia Hacked The Democratic National Committee

“More evidence found by Crowdstrike”

New Russian ties to the Democratic National Committee hacks have been observed by security researchers at Crowdstrike. One of the alleged telling signs is the maintenance of a hidden communication channel that allows for the continued theft of data after the initial breach, in the case of the case of the DNC done by Fancy Bear, a software consistent with Russian operatives.

Google’s new “Android Things” OS hopes to solve awful IoT security

“Hopes to encompass several Android vulnerabilities”

Developers can now build a smart devices using Android APIs and Google Services, applying IoT elements to the typical Android development toolkit. Developers can also now utilize the Google Weave protocol to communicate between devices like Google Cloud Vision.

Typo led to Podesta email hack: report

“March email allegedly led to mass breach”

John Podesta, Hillary Clinton’s campaign manager, had reportedly responded to a fake password reset email from Google that his IT staff had reported was authentic. The following data thefts resulted in a large scale smear upon the candidates campaign and Podesta’s reputation throughout the 2016 election cycle.

New Critical Fixes for Flash, MS Windows

“Patches to plug critical issues”

The new Adobe Flash Player patch fixes 17 serious security concerns currently being utilized by cyber criminals. Microsoft update hits on at least 42 issues reported over the last period, associated with Windows and other software’s.

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 115

‘Serious’ Windows Vulnerability Found by Google

“Adobe have issued fix, Windows has yet to issue its own patch”

Per Google’s new policy of exposing exploitative problems to the software creator, the firm has issued a public notice to Microsoft regarding sections of code that are capable of being appropriated by cyber criminals. The flaw, described as a “security sandbox escape,” bypasses cyber defense measures and allows malicious or dysfunctional programs to damage of collect sensitive information from the rest of the device. As of now Adobe’s patch for this issue, released October 21st, have been successful at resolving the issue. Microsoft itself has offered no security fix yet.

New Malware for Mirai Botnet Observed

“Coded partially with Tsunami/Kaiten protocol”

A new strain of malware that specifically targets IoT vulnerabilities and converts the into ‘slave’ devices has been released in the last few days by a collective of cybercriminals. ‘Linux/IRCTelnet’ is capable of conducting massive DDoS attacks, using common IoT appliances such as DVR’s, routers, lighting systems, and more, according to a research team on Malware Must Die.

Major ‘upgrade’ for Nymaim Malware

“Includes increased obfuscation and blacklisting softwares”

Verint researchers have observed several new events where the infamous Nymaim malware has been able to use new code based targets for phishing, rather than its original drive-by-download approach. This particular strain of malicious software has been in circulation since 2013, and has managed to stay ahead of threat researchers consistently with various upgrades that give it a leg up on those studying it. With this advantage, attacks have been seen to rise with use of the malware, with over 63 percent more incidents observed over the last year.

UK commits £1.9B to Cyber Security, Many Firms Contracted

“Recent threats from international actor’s prompts concern”

Just over £1.9B has been committed to increasing British cyber security measures after threats against the United States have been made in recent months. Giving new advantages to both defensive and offensive strategies, the new cyber defense plan will contract with both public and private firms to ensure top of the line systems within the next few years.