Security Alerts & News
by Tymoteusz A. Góral

#815 Persistent EITest malware campaign jumps from Angler to Neutrino
A two-year-old EITest malware campaign is still going strong, fueled by the fact it has shifted its distribution technique over time. Now, researchers at the SANS Institute’s Internet Storm Center, are reporting EITest is morphing again based on analysis of the malware campaign conducted earlier this month.

According to researcher Brad Duncan, the EITest malware campaign is being refueled by the fact it is shifting from the Angler exploit kit to the Neutrino exploit kit.

“During its run, I had only noticed the EITest campaign use Angler EK to distribute a variety of malware payloads. That changed earlier this month, when I noticed an EITest gate leading to Neutrino EK instead of Angler,” Duncan wrote in an Internet Storm Center post.
Read more
#818 This sneaky botnet shows why you shouldn't use the same password for everything
#817 SWIFT network doubles down on security
#816 Google plans to bring password-free logins to Android apps by year-end
#815 Persistent EITest malware campaign jumps from Angler to Neutrino
#814 Two exploit kits spreading attacks for recent Flash Player zero day
#813 Windows 10 problem? Now everyone can gripe to Microsoft via Feedback Hub
#812 Crooks used SQL injections to hack Drupal sites and install fake ransomware
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12