Webroot Community Weekly Highlights: 2/16/18

  • 16 February 2018
  • 0 replies
  • 413 views

Userlevel 7
Badge +48
Welcome to the Weekly Webroot Digest! 
 
This is a weekly series to highlight the best articles and news stories going on in the Community. 

 
What was your favorite story? What topics would you like to see? Sound off in the comments! 
 


 
 
Cyber News Rundown: Malware Attack Targets 2018 Winter Olympics
 
The Winter Olympics are in full swing, and cybercriminals seem to be working just as hard as the athletes. Their nefarious minds are focused on distributing malware that targets several internal WiFi and television systems. In addition to a delay during the opening ceremonies, the malware caused major damage to the networks by wiping non-critical network files and using stolen credentials to traverse the networks with ease. With plenty of international information on hand, it’s surprising the attack focused more on destruction over data collection.
 
DoubleDoor Botnet Chains Exploits to Bypass Firewalls
 
Crooks are building a botnet that for the first time is bundling two exploits together in an attempt to bypass enterprise firewalls and infect devices. Discovered by researchers from NewSky Security, the botnet has been cleverly named DoubleDoor. According to Ankit Anubhav, NewSky Security Principal Researcher, the DoubleDoor malware attempts to execute exploits that take advantage of two backdoors. 
 
Telegram Founder: Crypto Mining Malware Attack Isn’t Due to App Flaw
 
Exploitation of the bug involves the use of a classic right-to-left override attack when a file is sent using the messenger service. The special nonprinting right-to-left override (RLO) character represented as ‘U+202E’ is used to reverse the order of the characters following it in the string. 
 
Important Endpoint Security & Threat Intelligence Tools List
 
Endpoint Security & Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Endpoint Security & Threat Intelligence Tools list that covers Performing Penetration testing Operation in all the Corporate Environments.
 
The Community Team would like to thank and recognize @ and @ this week as they've helped contribute some great articles to our community! As always, a big thank you to everyone, especially @, for keeping our community up-to-date on the latest cybersecurity news. We truly appreciate it! 
 
What was your favorite story of the week? What did we miss? Let us know in the comments below!
 
 

0 replies

Be the first to reply!

Reply