Fake Webshops Storming the Internet (Ψεύτικα καταστήματα εισβάλλουν στο Διαδίκτυο)

Posted by & filed under Security Alerts, Security News.

Σε Ευρωπαικά δημοσιεύματα φαίρεται να έχουν εντοπιστεί ψεύτικα διαδικτυακά καταστήματα που εισβάλλουν στο Διαδίκτυο με πλαστοπροσωπίες δημοφιλών εμπορικών εταιρειών.  Παρακάτω εμφανίζεται ένας πίνακας που περιλαμβάνει τους κακόβουλους τομείς προκειμένου να αποτραπεί η απάτη των χρηστών του Διαδικτύου. website IP address brand aenergyes[.]com 196[.]245[.]52[.]77 nike amthucthuanviet[.]com 196[.]245[.]52[.]78 nike aquipopular[.]com 196[.]245[.]52[.]69 nike auweaving[.]com 196[.]245[.]52[.]76 nike buyconverseaustralia[.]com 196[.]245[.]52[.]80… Read more »

Over 100k daily brute-force attacks on RDP in pandemic lockdown

Posted by & filed under Security News.

The number of daily brute-force attacks against Windows remote desktop service has almost doubled during the pandemic lockdown, telemetry data shows. With the increase of remote workers during the COVID-19 period, many users no longer relied on the infrastructure monitored by the company to access sensitive information on the network. Thousands of daily attacks Personal… Read more »

Office 365 now checks docs for known threats before editing

Posted by & filed under Security News.

Microsoft today announced the general availability of the Office 365 Safe Documents security feature which expands the protection provided by Protected View by checking untrusted documents for risks and known threats. Safe Documents — launched in private preview in February — uses Microsoft Defender Advanced Threat Protection (ATP) to scan documents opened in Protected view and block users from… Read more »

Australian governments and companies targeted by a sophisticated state-based actor

Posted by & filed under Security News.

The Australian Government is currently aware of, and responding to, a sustained targeting of Australian governments and companies by a sophisticated state-based actor. The title ‘Copy-paste compromises’ is derived from the actor’s heavy use of proof-of-concept exploit code, web shells and other tools copied almost identically from open source. The Australian Cyber Security Centre’s Advisory 2020-008 details… Read more »