IT Security and Data Protection
Cloudflare Worker Employed as C&C Server by BlackWater Malware
Security researchers spotted BlackWater malware leveraging a Cloudflare Worker for command-and-control (C&C) functionality. MalwareHunterTeam observed that the threat activity began with an RAR file called “Important – COVID-19.rar.” The file pretended to ...
Working from Home during COVID-19? What You and Your Organization Need to Consider
First and foremost, our hearts go out to those around the world impacted by the COVID-19 virus. The director of the U.S. Center for Disease Control & Prevention (CDC), who advises the ...
Illinois Public Health Dept’s Website Went Down After NetWalker Attack
The website for a public health department in Illinois went down after the agency suffered a NetWalker ransomware attack. According to local media reports, officials at the Champaign-Urbana Public Health District (C-UPHD) ...
Phishing attacks exploit YouTube redirects to catch the unwary
Attackers are increasingly exploiting the fact that email gateways turn a blind eye to links to popular sites such as YouTube, in order to phish passwords from unsuspecting computer users. Researcher Ashley ...
Spam Campaign Leverages IQY Files to Distribute Paradise Ransomware
Security researchers detected a spam campaign leveraging Internet Query (IQY) files in an attempt to distribute Paradise ransomware. Lastline observed that the campaign began by trying to trick users into opening an ...
How to Leverage NIST Cybersecurity Framework for Data Integrity
Together with the National Cybersecurity Center of Excellence (NCCoE), the National Institute of Standards and Technology (NIST) has released a series of practice guides that focuses on data integrity: the property that ...
We Want You! Win the War on Ransomware Today
Arguably, the first malware extortion attack occurred in 1988 – the AIDS Trojan had the potential to be the first example of ransomware, but due to a design flaw, the victims didn’t ...
Chatbot Used by Phishing Scammers to Help Victims Provide Their Data
Digital fraudsters incorporated a chatbot into their phishing scam for the purpose of helping victims hand over their personal information. In a scam discovered by MalwareHunterTeam and shared with Bleeping Computer, digital ...
Four Important Steps to Secure the United States 2020 Election
It’s an unfortunate reality that cyber attacks on the U.S. 2020 election are likely to happen. However, while this is a potent threat to democracy, an even greater threat is to not ...
Facebook Sued by OAIC for Allegedly Violating Over 300K Aussies’ Privacy
The Office of Australian Information Commissioner (OAIC) filed a lawsuit alleging that Facebook violated the privacy of over 300,000 of its Australian users. On March 9, OAIC announced that it had submitted ...

