Technology Review: I’t confirmed by the recent “51%” cyber attacks, last one against Ethereum Classic, and by the cyber security weaknesses in the smart-contracts.
Check Point cyber security experts: There are gaps in management of inputs within the "unacev2.dll" library. Yoroi: If not necessary, block the ACE archives.
This batch is really dangerous, none of the organizations involved was aware of the data breach. So, their cyber security and that of customers is at risk.
The banking trojan is spreaded through mails with malicious attachments. It builds a PowerShell command from a downloaded image, thanks to steganography.
Cyber security expert Luka Šikić of WebARX: The flaw could allow attackers to modify the installation options. There is a patch, the plugin has to be updated ASAP.
Chris Jackson: We’re not supporting new web standards for it. This could cause serious problems to the users’ cyber security. It has already happened recently.
Wandera: A vulnerability in the e-ticketing systems could expose PII to malicious hackers. Less than a month ago a major security breach affected more than 140 companies.
Yoroi-Cybaze cyber security experts: cybercrime and state-sponsored hackers use simple social engineering tricks to lure users to enable the malicious Macros.