• img February 13, 2018

Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update

One of the bugs could allow a successful attack simply by a user viewing an email in Outlook’s Preview pane.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/two-nasty-outlook-bugs-fixed-in-microsofts-feb-patch-tuesday-update/

Read More
  • img February 13, 2018

Millions of Android devices forced to mine Monero for crooks

No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing. With that in mind, forced crypto mining attacks have also begun hitting mobile phones and tablets en masse, either via Trojanized apps or redirects and pop-unders. An example of […]

Read More
  • img February 13, 2018

Microsoft Patch Tuesday, February 2018 Edition

Microsoft today released a bevy of security updates to tackle more than 50 serious weaknesses in Windows, Internet Explorer/Edge, Microsoft Office and Adobe Flash Player, among other products. A good number of the patches issued today ship with Microsoft’s “critical” rating, meaning the problems they fix could be exploited remotely by miscreants or malware to […]

Read More
  • img February 13, 2018

Microsoft to provide Windows Defender ATP for older OS versions

Microsoft will backport Windows Defender Advanced Threat Protection (ATP) to meet the security needs of organizations that have not yet entirely switched to Windows 10. Windows Defender ATP provides deep insights into Windows 7 events on a rich machine timeline What is Windows Defender ATP? Windows Defender ATP is a unified endpoint security platform that […]

Read More
  • img February 13, 2018

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram

It’s just the latest reported vulnerability for the secure messaging application.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/venerable-unicode-technique-used-to-deliver-cryptomining-malware-through-telegram/

Read More