Original release date: January 24, 2019
Summary
The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised...
Attention all members.
Today, I tapped on a few links while searching for recipes. On about the 4th link, a " Warning Message " appeared to come from an authorized microsoft repair company. The warning stated that my computer will be locked if I shut it down and that I should...
Original release date: October 11, 2018
Summary
This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed
In it we highlight the use of five...
Hi
Both my wife and I are getting bogus emails from people we know that we know they aren't sending intentionally.
What these messages have in common is the code goo.gl/
I kind of understand that this is a signal to shorten the visible address.
The messages have no subject, have a message...
Original release date: July 20, 2018
Systems Affected
Network Systems
Overview
Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state...
Some information I've put together regarding social engineering and how people use it to get information. I will likely expand it in the future.
***UPDATE*** This file is safe I did not rig it as a test.
Original release date: May 12, 2017 | Last revised: May 19, 2017
Systems Affected
Microsoft Windows operating systems
Overview
According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in...
Original release date: December 01, 2016 | Last revised: December 14, 2016
Systems Affected
Microsoft Windows
Overview
“Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes...
anti-virus
avalanche
botnet
cyber crime
data theft
denial of service
dhs
fast flux
fbi
financial institutions
impact
malware
os update
password change
personal info
phishing
ransomware
remediation
security
windows
Original release date: July 01, 2017
Systems Affected
Microsoft Windows operating systems
Overview
On June 27, 2017, NCCIC was notified of Petya ransomware events occurring in multiple countries and affecting multiple sectors. Petya ransomware encrypts the master boot records of infected...
Original release date: May 12, 2017 | Last revised: May 13, 2017
Systems Affected
Microsoft Windows operating systems
Overview
According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as...
Microsoft solution available to protect additional products
Today many of our customers around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was...
antivirus
custom support
cybersecurity
defense strategies
it security
malware
malware protection center
microsoft
patch management
phishing
ransomware
security
system protection
update
vulnerability
wannacrypt
windows 8
windows defender
windows server 2003
windows xp
Today’s security updates include three updates that exemplify how the security ecosystem can come together to help protect consumers and enterprises. We would like to thank FireEye and ESET for working with us.
Customers that have the latest security updates installed are protected against the...
Today, a group of eight researchers from across the security industry released a research report on SHA-1 that demonstrates for the first time, a “hash collision” for the full SHA-1 hash algorithm (called “SHAttered”). This is a significant step toward understanding this type of security issue...
Original release date: December 01, 2016
Systems Affected
Microsoft Windows
Overview
“Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of...
anti-virus
avalanche
botnet
crimeware
cybersecurity
data theft
denial of service
dhs
fast-flux
fbi
financial fraud
malicious activity
malware
phishing
ransomware
remediation
security updates
sensitive data
user safety
windows
don't get suckered into the imitation software … always go directly to the source … in this case www.malwarebytes.com .
yep, another new ransomware variant is making the rounds … trying to pass itself off as legitimate software. supposedly the filename is...
Hi
I've been getting Phishing emails in the last few days.
I got one from my bank saying that someone had tried to log into my account and asked me to input my Account information and Password, to confirm that I was the account holder.
It said that if I didn't do this immediately my account...
Revision Note: V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping.
Summary...
With Office 365, we continue to invest in new protections against malicious email attacks. Today Shobhit Sahay from the Office 365 team walks through seven new Exchange Online Protection (EOP) and Advanced Threat Protection (ATP) features that proactively identify and block the most dangerous...
Revision Note: V1.0 (January 12, 2016): Advisory published.
Summary: Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy no longer allows root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of...