https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/
Tags: #security #ransomware #malware
  
  Tags: #security #ransomware #malware
Securelist
  
  WannaCry ransomware used in widespread attacks all over the world
  Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”…
  https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack
Tags: #security #malware #ransomware
  
  Tags: #security #malware #ransomware
the Guardian
  
  'Accidental hero' halts ransomware attack and warns: this is not over
  Expert who stopped spread of attack by activating software’s ‘kill switch’ says criminals will ‘change the code and start again’
  https://securelist.com/cowersnail-from-the-creators-of-sambacry/79087
Tags: #security #Windows #malware
  
  Tags: #security #Windows #malware
Securelist
  
  CowerSnail, from the creators of SambaCry
  We recently reported about SambaCry, a new family of Linux Trojans exploiting a vulnerability in the Samba protocol. A week later, Kaspersky Lab analysts managed to detect a malicious program for Windows that was apparently created by the same group responsible…
  https://research.checkpoint.com/beware-bashware-new-method-malware-bypass-security-solutions/
TL;DR: WSL (Windows Subsystem for Linux) can be a new vehicle for injecting malwares ("Bashwares") and it can be actived even if the user didn't.
Tags: #windows #security #malware #wsl
  
  TL;DR: WSL (Windows Subsystem for Linux) can be a new vehicle for injecting malwares ("Bashwares") and it can be actived even if the user didn't.
Tags: #windows #security #malware #wsl
Check Point Research
  
  Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions - Check Point Research
    With a growing number of cyber-attacks and the frequent news headlines on database breaches, spyware and ransomware, quality security products have become a commodity in every business organization. Consequently a lot of thought is being invested in devising…
  http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html
The official post (with a complete analysis) from the company which discovered CCleaner threat.
Tags: #security #malware
  
  The official post (with a complete analysis) from the company which discovered CCleaner threat.
Tags: #security #malware
Cisco Talos Blog
  
  CCleanup: A Vast Number of Machines at Risk
  Update 9/18: CCleaner Cloud version 1.07.3191 is also reported to be affected
Update 9/19: This issue was discovered and reported by both Morphisec and Cisco in separate in-field cases and reported separately to Avast.
Update 9/19: There has been some confusion…
  Update 9/19: This issue was discovered and reported by both Morphisec and Cisco in separate in-field cases and reported separately to Avast.
Update 9/19: There has been some confusion…
https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
  
  Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
  
  Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
  Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.