Safe Harbor on Cyber is a 'safe harbor' blog site on cyber security for families and small businesses with news on cyber threats, risk, data breach, identity thefts, ransomware, cryptocurrency, and vulnerabilities items.
CyberWisdom Safe Harbor Commentary: Today I came across this story from securityweek.com that highlights security researchers have found that a new malware family is targeting global web servers in an attempt to add it to an encrypted and mined botnet. The threat, dubbed RubyMiner, was discovered last week when it launched a massive attack on Web
CyberWisdom Safe Harbor Commentary: What is most likely to be an overlooked story from eweek.com revealed a long waited Oracle released a major patch update in January, fixing 237 vulnerabilities in the company’s product portfolio. The update was released on January 16, with attackers who cryptocurrency miner targeting Oracle in its October 2017 CPU patch vulnerability.
CyberWisdom Safe Harbor Commentary: What is most likely to be an overlooked story from thehill.com explains things we don’t talk about on Russia’s network of actions against the United States. It is said to be related to a hacker group called Fancy Bears, and even though lawmakers are trying to cope with the threat, they are
CyberWisdom Safe Harbor Commentary: BleepingComputer and TrendMicro have revealed further detail on the hackers malicious uses of Digimine for Monero cryptocurrency mining through Facebook Messenger. If a Facebook Messenger user has their account set to automatically log in, Digmine will immediately send a disguised video link, typically titled “video_xxxx.zip,” to all of their friends via direct message.
CyberWisdom Safe Harbor Commentary: A recent story from gbhackers.com outlines a recent fix to a key Microsoft Office vulnerability was used to distribute the powerful Zyklon malware that has some sophisticated features such as creating a backdoor in a victim’s machine.Researchers at FireEye recently observed that threat actors use the relatively new vulnerabilities in Microsoft
CyberWisdom Safe Harbor Commentary: Today, theregister.co.uk lays out things we don’t talk about that many industrial system vendors joined the vendor’s long list of performance and stability vulnerabilities that Meltdown and Spectre processors responded. So far, a dozen vendors have told ICS-CERT that they use a vulnerable processor, and The Register thinks there’s a lot more to
CyberWisdom Safe Harbor Commentary: A must read story from thehackernews.com dissects a revealing that a major vulnerability was discovered in the widely used Transmission BitTorrent application that could allow hackers to remotely execute malicious code malware threat on BitTorrent user computers and control them. This vulnerability was discovered by Google’s Project Zero vulnerability reporting team
CyberWisdom Safe Harbor Commentary: What is most likely to be an overlooked story from scmagazine.com concludes things we don’t talk about but we just been made aware that after 14 years, since 2004, Lenovo finally released a patch for the vulnerability, CVE-2017-3765 vulnerability on Lenovo Enterprise Network Operating System (ENOS), that was introduced 14 months