End-to-End Encryption with Max Krohn from Keybase.io

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 86 for September 16th 2019: All about end-to-end encryption ...
Attackers Using Excel 4.0 Macro Dropper to Spread ServHelper Backdoor

Attackers Using Excel 4.0 Macro Dropper to Spread ServHelper Backdoor

Digital attackers are using an Excel 4.0 macro dropper to infect unsuspecting users with a new variant of the ServHelper backdoor. In summer 2019, researchers at Deep Instinct detected a new attack ...

Equifax Settlement, Android Video File Exploit, Encryption Backdoors

This is your Shared Security Weekly Blaze for July 29th 2019 with your host, Tom Eston. In this week’s episode: Details on the Equifax breach settlement, why your Android phone could be ...
Modular Plurox Backdoor Comes with Cryptomining, Worm-Like Plugins

Modular Plurox Backdoor Comes with Cryptomining, Worm-Like Plugins

A new modular backdoor detected as “Plurox” comes with multiple plugins that expand its capabilities to include cryptomining and worm-like behavior. In February 2019, Kaspersky Lab’s researchers first detected the backdoor. Their ...
Figure 1 – Monero’s value in USD from December 2018 to June 2019, source - CoinGecko.com

Cryptojacking: An Unwanted Guest

We analyse a cryptojacking attack that mines the Monero cryptocurrency. The value of Monero in US dollars has more than doubled over the first half of 2019, from $46 to $98. The ...

Microsoft Warns of Malspam Campaign Abusing Office Vulnerability to Distribute Backdoor

Microsoft is warning users to be on the lookout for a malspam campaign that’s abusing an Office vulnerability in order to distribute a backdoor. On 7 June, Microsoft Security Intelligence took to ...
Huawei Fallout: UK Defence Minister Sacked Over Leak

Huawei Fallout: UK Defence Minister Sacked Over Leak

The surprising U.K. government position which we referenced in our prior piece on Huawei being a national security proxy for China wasn’t supposed to have been public knowledge. The information concerning the ...
Security Boulevard

Bad Actors Using MitM Attacks against ASUS to Distribute Plead Backdoor

Researchers believe bad actors are using man-in-the-middle (MitM) attacks against ASUS software to distribute the Plead backdoor. Near the end of April 2019, researchers at ESET observed several attack attempts that both ...
Backdoor

Did Huawei Hide Backdoors in Telco Kit? Or Is This More Bloomberg BS?

Today’s revelation that Huawei put backdoors into telecoms equipment is perfectly shocking. But is the story all that it seems? Yes, it’s Bloomberg again, trying to sound authoritative about security. But—some say—failing ...
Security Boulevard

Apple Card, ASUS Live Update Backdoor, Statistics on Malware Attacks

This is your Shared Security Weekly Blaze for April 1st 2019 with your host, Tom Eston. In this week’s episode: Apple’s new privacy focused credit card, the ASUS live update software backdoor, ...
Loading...