Security Alerts & News
by Tymoteusz A. Góral

#1614 Locky ransomware learns new evasive tricks
For several weeks security experts have had success slowing Locky ransomware infection rates. That’s been due to aggressive efforts to combat the Trojan downloader Nemucod, used in recent campaigns to distribute Locky. But now researchers say hackers behind Locky are changing tactics, giving the ransomware new legs.

According to the Microsoft Malware Protection Center team, Locky ransomware authors have shifted the type of malicious attachments used in their spam campaigns to evade detection. They have observed Locky authors moving away from the use of .wsf files hiding Nemucod.
Read more
#1617 FruityArmor APT group used recently patched Windows zero-day
#1616 Mobile applications leak device, location data
#1615 This ransomware is now one of the three most common malware threats
#1614 Locky ransomware learns new evasive tricks
#1613 3.2 million debit cards compromised; SBI, HDFC Bank, ICICI, YES Bank and Axis worst hit
#1612 Weebly confirms hack; millions of Foursquare accounts also exposed
#1611 The Reign of Ransomware (PDF)
#1610 Cisco ASA software identity firewall feature buffer overflow vulnerability
#1609 “Most serious” Linux privilege-escalation bug ever is under active exploit
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12