<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 7/26/2021

SHARE

Top News

An explosive spyware report shows limits of iOS, Android security

The shadowy world of private spyware has long caused alarm in cybersecurity circles, as authoritarian governments have repeatedly been caught targeting the smartphones of activists, journalists, and political rivals with malware purchased from unscrupulous brokers. The surveillance tools these companies provide frequently target iOS and Android, which have seemingly been unable to keep up with the threat. READ MORE...

Trends

Discord CDN and API Abuses Drive Wave of Malware Detections

Discord has a malware problem. And although the platform is predominantly used by gamers, it turns out even users who have never interacted with Discord are at risk. Discord creates servers or specific groups or communities of users who can send voice, text and other media messages between one another quickly. Researchers say there has been a massive uptick in the number of found Discord malware detections compared to last year. READ MORE...

Malware

Fake Windows 11 installers now used to infect you with malware

Scammers are already taking advantage of the hype surrounding Microsoft's next Windows release to push fake Windows 11 installers riddled with malware, adware, and other malicious tools. While Windows 11 will start rolling out worldwide during early 2022, Microsoft has already made it available for install to all customers enrolled in the Insider program after officially unveiling it as the next version of Windows last month. READ MORE...

Exploits/Vulnerabilities

Hackers abuse single bit change in Intel CPU register to evade detection

Security researchers have discovered a specific single bit (Trap Flag) in the Intel CPU register that malware can abuse to evade sandbox detection. According to researchers at Palo Alto Networks' Unit 42 threat research group, malware can detect whether it is executing in a physical or virtual machine (VM) by monitoring the response of the CPU after setting this single bit. READ MORE...


Windows "PetitPotam" network attack - how to protect against it

French researcher Gilles Lionel, who goes by @topotam77, recently published proof-of-concept code that attackers could use to take over a Windows network. The hack, which he has dubbed PetitPotam (which is a nod to the endangered Pygmy Hippopotamus, as far as we can tell), involves what's known as an NTLM relay attack, which is a form of manipulator-in-the-middle (MitM) attack against Microsoft's NTLM authentication system. READ MORE...

On This Date

  • ...in 1948, President Harry S. Truman signs Executive Order 9981, officially desegregating the U.S. military.
  • ...in 1964, actress Sandra Bullock (""Speed", "Gravity") is born in Arlington, VA.
  • ...in 1990, President George H.W. Bush signs the Americans With Disabilities Act.
  • ...in 2005, NASA launches space shuttle Discovery on STS-114, the first manned flight mission after the 2003 Columbia disaster.