This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact productinfo[at]silobreaker[dot]com for more information.

Heat – Trending Malware and Threat Actors
Name Heat 1 Heat 7 Vol 1 Vol 7
CryptoLocker 5 5
Trickbot Malware 14 70
URSNIF 5 13
Dridex Malware 6 18
GnosticPlayers 3 4
Shiny Hunters 3 3
TheDarkOverlord 3 4
FIN6 3 10
Mirai Trojan 4 9
Cosmic Lynx 5 50
Data Breaches
Securityblog – Dunzo suffers data breach; users’ phone numbers, email IDs exposed https://t.co/hZm6rBISic
Securityblog – TwitterJul 13 2020 20:50
Dunzo suffers data breach; users' phone numbers, email IDs exposed https://flip.it/mJbbN-
InfoSecHotSpot – Hacker breaches security firm in act of revenge Hacker claims to have stolen more than 8,200 databases from a secur… https://t.co/DTUY1tu0kk
InfoSecHotSpot – TwitterJul 13 2020 06:58
Hacker breaches security firm in act of revenge Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service. More and more users are conducting business on mobile devices. This can be due to increases…
InfoSecHotSpot – Hacker breaches security firm in act of revenge Hacker claims to have stolen more than 8,200 databases from a secur… https://t.co/WHvUZ7GuPr
InfoSecHotSpot – TwitterJul 13 2020 09:58
Hacker breaches security firm in act of revenge Hacker claims to have stolen more than 8,200 databases from a security firm's data leak monitoring service. More and more users are conducting business on mobile devices. This can be due to increases…
Hacker steals databases from breach monitoring site; sells them online
HackReadJul 13 2020 14:09
By Sudais Asif DataViper, a breach monitoring site is owned by… This is a post from HackRead.com Read the original post: Hacker…
Hacker Groups
Bing_Chris – DarkHotel in the news once again
Bing_Chris – TwitterJul 13 2020 16:49
DarkHotel in the news once again
U.S. Cyber Intelligence Warning Highlights Security Threat From Nation-Sponsored Advanced Persistent Threats (APTs) – Part 3
LexBlogJul 13 2020 18:55
This article is the last in our series on the threat APTs pose (you can find part 1 here and part 2 here ) and focuses on the practical steps organizations can take to guard against APT attacks. Given the sophisticated, patient nature of APTs and the…
No ‘Invisible God’: Fxmsp’s Operational Security Failures
CERT-EU – Latest Articles Ongoing Threats – RSSJul 13 2020 15:21
Network analysis of identities tied to Fxmsp, which promised to make "invisible gods" of buyers of its stolen remote-access credentials (Source: Group-IB) To the long list of alleged hackers who failed to practice good operational security so they…
YourAnonNews – We are doing our best to release our statement regarding RedHack and their backstabbing within the next weeks. Stay… https://t.co/FW7Q0eGok2
YourAnonNews – TwitterJul 13 2020 21:59
We are doing our best to release our statement regarding RedHack and their backstabbing within the next weeks. Stay tuned.
#Turkey #Anonymous
Malware
2020-07-13 – Hancitor infection with Ursnif
Malware-Traffic-Analysis.net – Blog EntriesJul 13 2020 22:13
2020-07-13 – Dridex infection
Malware-Traffic-Analysis.net – Blog EntriesJul 13 2020 23:08
InfoSecHotSpot – Malware evading analysis by adding https://t.co/3je1IAsrHr sandbox detection https://t.co/3je1IAsrHr is a malware a… https://t.co/Dr1K15IzB5
InfoSecHotSpot – TwitterJul 13 2020 13:58
Malware evading analysis by adding https://bit.ly/32bymaX sandbox detection https://bit.ly/32bymaX is a malware analysis sandbox service that lets researchers and users safely analyse malware without risk to their computers. And now malware…
The chance of data being stolen in a ransomware attack is greater than one in ten.
Security Bloggers NetworkJul 13 2020 12:21
Ransomware attacks in which data is both encrypted and stolen have become increasingly commonplace. In this report, we examine the likelihood of a ransomware attack also being a data breach. The post …
Vulnerabilities
CVEnew – CVE-2019-19338 A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 whe… https://t.co/mlZPtfv4Wm
CVEnew – TwitterJul 13 2020 16:45
CVE-2019-19338 A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is…
Lost in Translation: Serious Flaws Found in ICS Protocol Gateways
Dark Reading – All StoriesJul 13 2020 21:25
These oft-forgotten devices contain serious vulnerabilities that allow attackers to hack OT systems remotely, researchers will reveal at Black Hat USA next month.
Critical SAP Recon flaw exposes thousands of customers to attacks
BleepingComputer.comJul 14 2020 02:21
SAP patched a critical vulnerability affecting over 40,000 customers and found in the SAP NetWeaver AS JAVA (LM Configuration Wizard) versions 7.30 to 7.50, a core component of several solutions and products deployed in most SAP environments. […]
Critical SAP Recon flaw exposes thousands of systems to attacks
BleepingComputer.comJul 14 2020 02:21
SAP patched a critical vulnerability affecting over 40,000 systems and found in the SAP NetWeaver Java versions 7.30 to 7.50, a core component of several solutions and products deployed in most SAP environments. […]
Ongoing Campaigns
13th July – Threat Intelligence Bulletin
Check Point Research – RSSJul 13 2020 16:23
For the latest discoveries in cyber research for the week of 13th July 2020, please download our Threat Intelligence Bulletin. Top Attacks and Breaches Check Point Research has…
What is DNS Spoofing?
LIFARS BlogJul 13 2020 13:30
DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is disguised to look like a real one, with the intention of stealing credentials of the users or diverting network
Trojans, Backdoors and Droppers the Top Three Malware Globally?
E Hacking NewsJul 13 2020 17:54
According to a few recent surveys and analysis conducted by some well-known and influential cybersecurity agencies, there are approximately 3 top malwares that the users should be aware of. 'Gate-crashing' enterprises and users globally are Trojans,…
Russian BEC Gang Targets Hundreds of Multinational Companies
DataBreaches.netJul 13 2020 12:44
Akshaya Asokan reports: A newly uncovered Russia-based business email compromise gang has been targeting hundreds of large, multinational corporations in over 40 countries since 2019, according to the security firm Agari. The gang, which Agari calls…

Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.

Silobreaker Daily Cyber Alert

Sign up for the latest news on data breaches, hacker groups, malware and vulnerabilities.

Silobreaker
This website uses cookies.
See our privacy policy at www.silobreaker.com/legal