“Multiple adversaries” exploiting Confluence vulnerability, warns Microsoft

Credit to Author: Christopher Boyd| Date: Tue, 14 Jun 2022 12:43:08 +0000

Microsoft has warned of APT groups and ransomware authors exploiting the now patched Confluence vulnerability. We take a look at the dangers.

The post “Multiple adversaries” exploiting Confluence vulnerability, warns Microsoft appeared first on Malwarebytes Labs.

Read more

Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs)

Credit to Author: Bill Cozens| Date: Tue, 14 Jun 2022 12:38:13 +0000

In this post, we’ll give you a step-by-step on how to complete an Inventory and vulnerability scan in Malwarebytes Vulnerability Assessment for OneView.

The post Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs) appeared first on Malwarebytes Labs.

Read more

Don’t panic! “Unpatchable” Mac vulnerability discovered

Credit to Author: Pieter Arntz| Date: Tue, 14 Jun 2022 09:53:27 +0000

Researchers at MIT have published details about an attack that uses a flaw in the M1 security feature pointer authentication codes.

The post Don’t panic! “Unpatchable” Mac vulnerability discovered appeared first on Malwarebytes Labs.

Read more

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison

Credit to Author: BrianKrebs| Date: Tue, 14 Jun 2022 00:09:09 +0000

A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites.

Read more

Before Patch Tuesday, a to-do list to avoid trouble

Credit to Author: Susan Bradley| Date: Mon, 13 Jun 2022 10:11:00 -0700

You could call today Patch-Tuesday Eve. It’s the day before Windows machines get offered updates from Microsoft. What should you be doing to prepare?

It depends on what kind of computer user you are.

If your files are stored in the cloud

You keep everything in the cloud, you use a Microsoft account, you don’t mind reinstalling your OS if need be. Your data is protected by a username and a password, and if you are savvy, your data is protected by two-factor authentication.  

Prior to Patch Tuesday, you might decide you don’t need to back up your computer system since you know if something happens to your computer, you can reinstall the operating system and merely reconnect to your various online storage services. You’ve double-checked that all cloud services you use have file versioning enabled, so if you need to roll back to a prior version of a file, you can do so.

To read this article in full, please click here

Read more

Taking down the IP2Scam tech support campaign

Credit to Author: Threat Intelligence Team| Date: Mon, 13 Jun 2022 17:41:16 +0000

Tech support scams follow a simple business model that has not changed much over the years. After all, why change a recipe that continues to yield large profits. We see countless such campaigns and block them indiscriminately to protect our customers from being defrauded by a fraudulent tech support agent over the phone. Every now…

The post Taking down the IP2Scam tech support campaign appeared first on Malwarebytes Labs.

Read more

The many lives of BlackCat ransomware

Credit to Author: Paul Oliveria| Date: Mon, 13 Jun 2022 16:00:00 +0000

The use of an unconventional programming language, multiple target devices and possible entry points, and affiliation with prolific threat activity groups have made the BlackCat ransomware a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.

The post The many lives of BlackCat ransomware appeared first on Microsoft Security Blog.

Read more

5 ways to connect with Microsoft Security at Identiverse 2022

Credit to Author: Christine Barrett| Date: Mon, 13 Jun 2022 15:00:00 +0000

Microsoft will be attending Identiverse 2022 and would love to connect with partners and others interested in identity. Here are five ways to do that.

The post 5 ways to connect with Microsoft Security at Identiverse 2022 appeared first on Microsoft Security Blog.

Read more