HackerSecret.com - The Most Authoritative Site in the World on the Hacking Tools and Techniques, Penetration Testing and CyberSecurity

  • Home
  • Visit Our Shop
  • Download the free App
  • Contact us for Info
VISIT OUR SHOP! CLICK HERE !

A week in security (June 10 – 16)

by / Wednesday, 19 June 2019 / Published in Hacking
Share
Tweet
Pin
0 Shares

Last week on Malwarebytes Labs, we revealed to readers the mindset of security pros as to why they lack confidence in their ability to prevent their organizations getting breached. We also reported on Maine Governor Janet Mills implementing the state’s own privacy protections, how Apple can better protect its users’ privacy, the continuous trending of the MegaCortex ransomware, how cyberbullies and trolls use Twitter Lists to home in on their targets, and the newest trend of adware and PUPs abusing push notifications to compromise user systems.

Other cybersecurity news

  • Treading the MuddyWater: This Iranian APT resurfaced with new tools and tactics under its belt, revealed latest analysis report. (Source: TrendLabs Security Intelligence Blog)
  • A new sextortion scam involves fraudsters posing as rogue CIA agents and telling their marks that they are being probed for online pedophilia—but are willing to settle the matter for $ 10,000 worth of Bitcoins. (Source: The Register)
  • A Customs and Border Protection (CBP) subcontractor was compromised, and now the threat actor has thousands of images of US travelers and license plates. (Source: WIRED)
  • VLC users, rejoice! Your favorite media player patched a lot of bugs recently, including two that were marked as high severity. Update now if you haven’t already. (Source: Threatpost)
  • Taking advantage of the popularity of Google’s Gmail and Calendar apps, threat actors were found targeting users via malformed and unwanted Google Calendar notifications. (Source: Forbes)
  • Here’s a chilling discovery: Threat actors steal your personal and medical data, so they can impersonate your doctor. (Source: The Next Web)
  • A new report revealed that cryptocurrency miners are distributed using advanced targeted attack toolkits, such as those used by the Equation Group, and planted onto company computers. (Source: TrendLabs Security Intelligence Blog)
  • Fishwrap, a new disinformation campaign on Twitter that uses modified old news and repackages them as new, sought to sow discord amongst users. A nation-state is likely behind it, says researchers. (Source: Cyberscoop)
  • Google: We’re not killing ad blockers. Ad blockers: OH, YES YOU ARE. (Source: WIRED)
  • Surveillance cameras could be weaponized with the use of artificial intelligence (AI), according to a report from the American Civil Liberties Union (ACLU). (Source: The New York Times)

Stay safe, everyone!

The post A week in security (June 10 – 16) appeared first on Malwarebytes Labs.

Malwarebytes Labs

Share
Tweet
Pin
0 Shares
Tagged under: June, Security, WEEK

Click here now to visit our Shop!

Click here now to visit our Shop!

Other 2300 users like you have already done it this year!

Choose the product you need here!

  • THE FIRST TRUE ANDROID SMARTPHONE FOR HACKING WITHOUT ROOT UNIQUE IN THE WORLD WITH ALL THE APPS !!! 499,99€ 229,99€
  • HACKER LIBRARY THE LARGEST COLLECTION OF BOOKS AND MANUALS ON HACKING + 100 !!! 99,99€ 29,99€
  • HACK SOCIAL THE GUIDE TO HACK ALL THE SOCIAL ACCOUNTS 99,99€ 29,99€
  • HACKER PACK FOR YOUR SMARTPHONE AND YOUR TABLET WITH ROOT GUIDE AND + 100 PROGRAMS !!! 99,99€ 29,99€
  • THE FIRST TRUE ANDROID SMARTPHONE FOR HACKING UNIQUE IN THE WORLD WITH ALL THE APPS !!! 599,99€ 249,99€
  • HACKER PACK FOR YOUR COMPUTER AND NOTEBOOK + 1000 PROGRAMS 5 GB OF STUFF !!! 99,99€ 29,99€

Our customers say

Annabel M. – Systems Engineer

 
Samuel D. – Ethical Hacker

 
Karola M. – Influencer

 
Marcus P. – Private Investigator

 
Rosemary S. – Housewife

 
Amit V. – IT Consultant

 
Matthew C. – Entrepreneur

 
Aisha B. – Computer Science student

 
Li W. – IT Analyst

 
Robert C. – Programmer

 

DOWNLOADED 1316 TIMES!

DOWNLOADED 1316 TIMES!

Download now Hacker Secret our free Android app.

CONTACT US NOW FOR IMMEDIATE SUPPORT!

Contact Us
Write your email address here
Write here how we can help you - we support you immediately for all your needs!

## Are you looking for products for hacking, computer security and penetration testing? Do you need to clean up your smartphone, your PC or your site from viruses and malware? Do you need to track down someone or retrieve urgent information? Do you want to buy devices already configured to experiment all the hacking techniques quickly and easily? Do you have special needs in software or hardware? ##

Contact us now … another 2300 users like you have already done it this year!

Click here now!

 

Search on the site

Latest posts

  • How to tell if someone is stealing your wifi

  • How to check saved passwords on Chrome

  • The Computer Security Day

  • What is digital forensics

  • How to install Metasploit in Termux?

All the techniques, products and services described or contained on this site are intendend for exclusive use of study and professional training and to test the security of own's computer network in accordance with the national legislations on access to computer and online systems. All the services provided on this site (penetration testing, social accounts hardening, Incident Response & CSIRT, MSSP, Cybersecurity Consultancy, etc.) can be provided only with prior written and documented authorization from the owners or their legitimate representatives in accordance with current national regulations .

TOP
New Order