<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 4/26/2021

SHARE

Top News

Emotet malware nukes itself today from all infected computers worldwide

Emotet, one of the most dangerous email spam botnets in recent history, is being uninstalled today from all infected devices with the help of a malware module delivered in January by law enforcement. The botnet's takedown is the result of an international law enforcement action that allowed investigators to take control of the Emotet's servers and disrupt the malware's operation. READ MORE...

Hacking

Hacker leaks 20 million alleged BigBasket user records for free

A threat actor has leaked approximately 20 million BigBasket user records containing personal information and hashed passwords on a popular hacking forum. BigBasket is a popular Indian online grocery delivery service that allows people to shop online for food and deliver it to their homes. This morning, a well-known seller of data breaches known as ShinyHunters posted a database for free on a hacker forum that he claims was stolen from BigBasket. READ MORE...


Oscar-Bait, Literally: Hackers Abuse Nominated Films for Phishing, Malware

Anticipation surrounding the upcoming 93rd Academy Awards broadcast on Sunday is being used by scammers to trick people into giving up their credentials - they think they're about to stream Oscar-nominated films, but the reality turns out to be much different. Prior to the winners being announced during the ceremony, many film fans like to watch as many of the nominated movies as possible. Scammers know this and are ready to strike. READ MORE...

Information Security

Schneier on Security: When AIs Start Hacking

If you don't have enough to worry about already, consider a world where AIs are hackers. Hacking is as old as humanity. We are creative problem solvers. We exploit loopholes, manipulate systems, and strive for more influence, power, and wealth. To date, hacking has exclusively been a human activity. Not for long. Artificial intelligence will eventually find vulnerabilities in all sorts of social, economic, and political systems, and then exploit them at unprecedented speed, scale, and scope. READ MORE...

Exploits/Vulnerabilities

Breach at Click Studios-owned password manager left clients exposed for more than 24 hours

For more than 24 hours this week, hackers had unfettered access to the update mechanism for a popular password manager that claims hundreds of thousands of IT professionals as clients, incident responders revealed on Friday. The malicious code found in the Passwordstate software offered the unidentified attackers a potential foothold onto any customer network that downloaded the update during that time. READ MORE...

Science & Culture

Computer security world in mourning over death of Dan Kaminsky, aged 42

Celebrated information security researcher Dan Kaminsky, known not just for his technical ability but also for his compassion and support for those in his industry, has died. He was 42. Though Kaminsky rose to fame in 2008 for identifying a critical design weakness in the internet's infrastructure - and worked in secret with software developers to mitigate the issue before it could be easily exploited - he had worked behind the scenes in the infosec world for at least the past two decades. READ MORE...

On This Date

  • ...in 1865, Union cavalry troops fatally shoot fugitive assassin John Wilkes Booth, 10 days after he shot and killed President Lincoln.
  • ...in 1933, actress and comedienne Carol Burnett ("The Carol Burnett Show", "Annie") is born in San Antonio, TX.
  • ...in 1961, action film star and martial artist Jet Li ("Hero", "Fist of Legend") is born in Beijing, China.
  • ...in 1986, the Chernobyl power plant in Ukraine experiences a reactor failure, causing the worst nuclear disaster in human history.