Monday 27 July 2020

Thursday 23 July 2020

Phishing Campaigns During COVID-19.




During the COVID19 pandemic number of phishing campaigns extremely increased.
Here are the most “popular” email subjects used in phishing campaigns in 2020:
1.     Password change/check required
2.     COVID-19 Awareness/News
3.     Vacation Policy Update
4.     Rescheduled meetings due to COVID-19
5.     Coronavirus Stimulus Checks
6.     Fedex Tracking
7.     Zoom: Restriction Notice Alert
8.     Jira: [JIRA] A task was assigned to you
9.     Your meeting attendees are waiting
10.  Microsoft: Abnormal log in activity on Microsoft account
11.  IT: ATTENTION: Security Violation
Hope you weren’t part of them! Enforce security awareness in your company!

How do you look at problems?



Wednesday 22 July 2020

Thursday 9 July 2020

Critical Android Vulnerabilities are Patched by Google.




Few critical remote code execution vulnerabilities are addressed in the July update.
The most severe flaws allow attackers to execute code with high privileges using a special file. One of them is impacting Android 8.0+ (CVE-2020-0224), another affects Android 10(CVE-2020-0225).
Another critical flaw in Android 10(CVE-2020-0107) is an information disclosure vulnerability.
In addition to critical flaws Google is patching bunch of high severity issues, such as privilege escalation in the framework, issues in WLAN and Qualcomm kernel.


Wednesday 8 July 2020


#cybersecurity #programming #quotes 


Dark Web: Over 15 million credentials from 100 000 data breaches.


According to Digital Shadows Photon Research a number of stolen user credentials increased by 300% comparing with 2018. Over 15 million account logins, including user names and passwords, were stolen from 100 000 data breaches. Approximately 5 million user credentials are unique.
Reported average price for one pair was a bit over $15, however some premium banking credentials were sold for much more. Anti-virus and security related credentials were sold for around $22. The most valuable pairs were admin's credentials which give cybercriminals access to the whole network. The full report can be found and analyzed.