Share Blog Post
By exploiting a Microsoft Word feature, hackers are delivering cryptojacking scripts on victims’ computers to mine cryptocurrency. Hackers are delivering malicious videos via spam emails and tricking users into clicking on them to view the video. Thus, hackers gains complete control of the system by executing malicious code into the targeting system.
Drive-by download attack
Several Chinese websites are being targeted by drive-by download attacks, that are compromised to load external content via scripts and iframe overlays. The campaign is found installing a Coinhive clone. The attack also redirects users to a server hosting a few exploits.
OpenBSD released a mitigation for the Meltdown security vulnerability in the form of a Version 11 code update. The impact the fix will have on performance is not determined yet. A testing will soon be conducted for OpenBSD users.
Intel releases Microcode updates
Intel has started releasing microcode updates to its OEM partners in order to mitigate the Meltdown and Spectre flaws. The new firmware updates apply to Intel's 6th, 7th, and 8th generation Core product lines, also known as Skylake, Kaby Lake, and Coffee Lake.
Trend Micro patches flaws
Researchers have tracked down over 12 vulnerabilities, with severity ranging from low to critical, in Trend Micro’s Micro Encryption for Email Gateway, (TMEEG). Security updates have been released in version 5.5 Build 1129 to plug 10 of these 12 security bugs.
Nearly 2000 patients have lost private health information, including medical records and addresses, after an unnamed third party gained access to the University of Virginia (UVA) Health System. Hacker placed malware on a physician's laptop enabling that person to see what the doctor was viewing.
Subscribers' password stolen
Harper’s Magazine released a warning to all subscribers that their passwords may have been stolen. However, when subscribers went to change the password in the given link, they could not do so as Buysub’s website was down.
Posted on: February 23, 2018
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.
Explore Industry Briefs
Cyware for Enterprise
Adopt next-gen security with threat intelligence analysis, security automation...
Cyware for ISACs/ISAOs
Anticipate, prevent, and respond to threats through bi-directional threat in...