Les vulnérabilités du VPN vous préoccupent ? Découvrez comment profiter de notre solution de migration VPN qui inclut 60 jours de service gratuit.

Blog Zscaler

Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception

S'abonner
Nouveautés et annonces

Top 7 Cybersecurity Stories This Week 11-04-2016

image
ANTHONY GIL
novembre 03, 2016 - 3 Min de lecture

States Work to Protect Voting Systems for Election Day

According to the WSJ, approximately 40 U.S. states are working closely with the DHS to protect their voting systems. Hackers have scanned the election systems of at least 20 states, U.S. officials said, and now many states across the country are working to protect their election systems from digital tampering. Read more.

How some data “retired” from the OCC

The Office of the Comptroller of Currency, an independent arm of the Treasury Dept that “ensures the safety and soundness of the national banking system,”  disclosed that the organization was breached due to a former employee’s unauthorized removal of more than 10,000 records. The breach occurred in November 2015 when a former employee downloaded a large number of files onto two thumb drives before retiring from the agency. The OCC said data on the thumb drives were encrypted and there is no evidence that data taken by the employee were “disclosed” or “misused.” Read more.

Google Researchers Disclose New Windows Zero-Day

Google disclosed a new Windows zero-day vulnerability that has been used for an unknown number of attacks. Microsoft has not yet issued a fix to the flaw, which Google said is a local privilege escalation vulnerability in the Windows kernel. The vulnerability could be used to escape the sandbox and execute code on the compromised device. According to Google researchers Neel Mehta and Billy Leonard, hackers already knew about the vulnerability and were using it to compromise people’s machines. Read more.

New Nymaim Dropper Malware

Researchers at security company Verint discovered a new variant of the Nymaim dropper. The updated malware includes new delivery and obfuscation methods, and uses PowerShell routines to download payloads. The updated dropper, used primarily to download banking Trojans in the past, has also been spreading ransomware. “Unlike the 2013 variant of the dropper, which was almost exclusively distributed via drive-by-downloads, the new incarnation brings to the table new features and is spread through spear phishing,” wrote Threatpost. Read more.

AdWords malware targets Mac users

Researchers at Cylance discovered new malware that targeted Mac users looking to download Chrome. The malware authors cleverly used AdWords to deliver the malware when users conducted a Google search for the Chrome download. Read more.

Connected home device vulnerability gives hacker access to user’s smartphone

An SQL injection vulnerability was discovered in Belkin’s WeMo home automation firmware that could give a third party local network access to gain root access to other connected devices. Researchers at Invincea Labs discovered the vulnerability and issued warning of the bug that allows anyone who is on the same network to hack the app and get access to the user’s cellphone – giving the intruder the ability to download all photos and track the user’s position. Read more.

form submtited
Merci d'avoir lu l'article

Cet article a-t-il été utile ?

dots pattern

Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception

En envoyant le formulaire, vous acceptez notre politique de confidentialité.