Security Alerts

Boost IT wants to keep you informed of security alerts and keep your business a step ahead of potential threats automatically.

Security Alerts Map

This is a real-time security alerts map.


If you are subscribed to our managed security service, no action is required.
Your devices will update automatically.

August 2018 Security Alerts

NetGain Systems Enterprise Manager TFTP Vulnerability (Apr 26, 2018)
Satan Ransomware employs EternalBlue Exploit Kit (April 26th, 2018)
Drupalgeddon 2 Vulnerability (Apr 20, 2018)
New ransomware forces you to play PUBG video game. (Apr 19, 2018)
Microsoft Security Bulletin Coverage (Apr 12, 2018)
This Android Monero miner demands admin privileges (Apr 10, 2018)
LockCrypt ransomware spotted in the wild (Apr 06, 2018)

October 2017 Security Alerts

The IoT Reaper botnet – Quiet before another storm (Oct 25, 2017)
BadRabbit ransomware spreads fast through Russia and Ukraine (Oct 24, 2017)

August 2017 Security Alerts

Ebaywall ransomware, a digital revenge against Ebay (Aug 04, 2017)
HPE Intelligent Management Center Integer Underflow Vulnerability (Aug 3, 2017)

How Our Managed Security Service Protected Our Client from Ransomware
How our managed security service blocked ransomware

Actual Screenshot of E-mail Received by Hackers

Today, on August 1, 2017, a principal at an engineering client of ours received this e-mail above prompting him to download a file. He e-mailed us to complain that the firewall was blocking the file download. The end result is that since they are subscribed to our managed security service, it did exactly what it was designed to do, which is block ransomware.

The Client Success Manager reviewed the e-mail that the principal sent to us and when he hovered over the “Download Document” link he noticed the link in the bottom left (see above) would have taken him to a weird URL like This engineering client uses our Managed Security service and it blocked him from infecting his machine and his company file server and from downloading the malware or ransomware. Keep in mind that this e-mail got sent to a number of other people at the engineering firm as well, and it was also blocked for them. Our managed security service kept this engineering firm from losing hundred or thousands of dollars in ransom and lost productivity.

My guess is that our client’s client may want to use our managed security service, too.

July 2017 Security Alerts

Hackers Now Attacking Unconfigured WordPress Sites (July 22, 2017)

View the SonicWALL Security Alert page, updated in real time.

January 2015 Security Alerts

Microsoft Patches Bug used by Chinese Hackers

Malware was used to exploit a Adobe Flash Player vulnerability

 October 2014 Security Alerts

Released October 1, 2014

You can also check Trend Micro’s security alerts & threats page.

Trend Micro’s 2015 Security Threats Predictions

2014 brought with it many significant additions to the technology landscape. These put new capabilities into the hands of users and companies that allowed them to do things that they would not have thought possible before. However, these same changes also aid threat actors: threats can now come from unexpected vectors, and augment the existing capabilities that attackers already possess.

What are the key developments that will shape the threat landscape of tomorrow, and how do we foresee its evolution? These are the trends that we think will shape 2015:

More cybercriminals will turn to darknets and exclusive-access forums to share and sell crimeware.

We’ve seen cybercriminals leveraging Deep Web and other darknet services as well as untraceable peer-to-peer networks (e.g. Tor, I2P, Freenet) for selling and exchanging tools and services. Takedowns and collaborative efforts beween researchers and law enforcement agencies have disrupted cybercrime gangs, giving them more reasons to go further underground. Security firms together with law enforcement agencies need to extend their reach by providing threat intelligence and having one definition of cybercrime to help law enforcers regardless of jurisdictions, to catch cybercriminals and attackers.

Increased cyber activity will translate to better, bigger, and more successful hacking tools and attempts.

Cybercriminals will go after bigger targets rather than home users as this can generate more profits for them. We will see more data breach incidents with banks, financial institutions, and customer data holders remaining to be attractive targets. As such, organizations and individuals need to assume compromise; enterprises need to constantly monitor their network for any threats while individual users must always change their passwords to prevent data theft.

Exploit kits will target Android, as mobile vulnerabilities play a bigger role in device infection.

Aside from the growth of Android threats, we will see more vulnerabilities found in mobile devices, apps, and platforms in the coming year. Cybercriminals will target data stored in these mobile devices. In addition, attackers may employ tools similar to Blackhole Exploit Kit (BHEK), leveraging Android OS fragmentation. Traditional threats like ransomware will plague the mobile landscape as well.

Targeted attacks will become as prevalent as cybercrime.

The success of high-profile targeted attack campaigns has highlighted the fact that cyber attacks are useful means of gathering intelligence. With this, we will see targeted attacks from other countries, not just countries that are commonly said to be the source of these attacks. We will observe more diversity in terms of targets and attack origins as more threat actors with differing agendas are seen. Although the motivations of threat actors may vary, they will continue to steal information such as top-secret government, data, financial information, intellectual property, industry blueprints, among others. Social media will become a new entry point for targeted attacks.

New mobile payment methods will introduce new threats.

The introduction of Apple Pay with the iPhone 6 and 6 Plus may kickstart the adoption of mobile payment systems by many consumers. Apple Pay is not alone in the market – other payment systems have or will be introduced by other companies and trade associations. Not all of these payment systems have been thoroughly tested to withstand real-world threats, and we may see attacks targeting mobile commerce in 2015.

We will see more attempts to exploit vulnerabilities in open source apps.

In 2014, we saw several vulnerabilities in open-source projects such as Shellshock and Heartbleed. These vulnerabilities were undetected for years and were only brought into light recently. Due to the massive impact of these vulnerabilities, cybercriminals and attackers may decide to investigate the existing code and see if other dormant vulnerabilities are present.

They will also set their eyes on other less-known platforms, protocols, and software. Furthermore, they will look for vulnerabilities found in open source platforms and apps (for example Open SSL v3) as well as OS kernels.

Technological diversity will save IoE/IoT devices from mass attacks but the same won’t be true for the data they process.

A wide variety of devices will make up the Internet of Things/Internet of Everything – from fitness devices to smart home appliances, the smartification of everything will continue apace. This variety will also provide this field some measure of safety – no single attack will cover all of these devices. However, the data gathered by these devices may well be at risk if companies providing various IoE services are breached.

More severe online banking and other financially motivated threats will surface.

Weak security practices like not using two-factor authentication and chip-and-pin technology continue to persist in the banking sector. These practices will cause financially motivated threats to grow in scale throughout the coming year.

Apart from credentials, cybercriminals will steal user identities. Mobile device users will also be affected by these threats as cybercriminals will launch mobile phishing attacks, use of fake aps and domain name system (DNS) changers. We will see stealthier mobile threats that use packers similar to computer software.