Security Alerts & News
by Tymoteusz A. Góral

History
#2068 Researchers uncover PowerShell Trojan that uses DNS queries to get its orders
Researchers at Cisco's Talos threat research group are publishing research today on a targeted attack delivered by a malicious Microsoft Word document that goes to great lengths to conceal its operations. Based entirely on Windows PowerShell scripts, the remote access tool communicates with the attacker behind it through a service that is nearly never blocked: the Domain Name Service.

The malware was first discovered by a security researcher (@simpo13) who alerted Talos because of one peculiar feature of the code that he discovered: it called out Cisco's SourceFire security appliances in particular with the encoded text, "SourceFireSux."
Read more
#2071 Researcher breaks reCAPTCHA using Google's speech recognition API
#2070 Free decryption tools now available for Dharma ransomware
#2069 50 Google engineers volunteered to patch thousands of Java open source projects
#2068 Researchers uncover PowerShell Trojan that uses DNS queries to get its orders
#2067 Hacking Slack using postMessage and WebSocket-reconnect to steal your precious token
#2066 0patching a 0day: Windows gdi32.dll memory disclosure (CVE-2017-0038)
#2065 Mike Pence used an AOL e-mail account for state business and it got hacked
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12