It has been a pretty quiet week with few alleged attacks against corporate victims and mostly new variants of existing ransomware released.

The most interesting news is the Conti ransomware that appears to share the same code as Ryuk and could possibly be its successor. Ryuk has significantly decreased in activity over the past couple of months, while Conti has seen an increase.

Only time will tell, but Conti is definitely one that we need to keep an eye on.

Contributors and those who provided new ransomware information and stories this week include: @VK_Intel, @fwosar, @struppigel, @BleepinComputer

​Google Chrome Password Manager lets you save usernames and passwords and automatically use them to log in to websites you visit. If you ever decide to switch from or to Google Chrome and want to take your saved passwords with you, this guide will help you.

With data breaches and credential stuffing attacks running rampant, it is more important than ever to use a unique and robust password at every site they visit.

Thus, many users turn to their web browser to act as a password manager and save passwords as they log in to sites.As Google Chrome is the

Palo Alto Networks (PAN) today addressed another severe vulnerability found in the PAN-OS GlobalProtect portal and affecting unpatched PAN next-generation firewalls.

On June 29, PAN also patched a critical vulnerability (CVE-2020-2021) with a 10/10 CVSSv3 rating, allowing unauthenticated network-based attackers to bypass authentication on PAN-OS devices with SAML auth enabled and the ‘Validate Identity Provider Certificate’ option disabled.

The OS command injection vulnerability patched today and tracked as CVE-2020-2034 allows unauthenticated remote attackers to execute arbitrary OS commands with root privileges on unpatched devices.

The CVE-2020-2034 vulnerability has been rated as high severity with a CVSS 3.x base score of

The US Department of Justice has indicted a hacker known as ‘Fxmsp’ for hacking into and selling access to over three hundred organizations worldwide.

In an indictment unsealed today, the DOJ is charging a citizen of Kazakhstan named Andrey Turchin, also known as “Fxmsp,” with conspiracy to commit computer hacking, two counts of computer fraud and abuse (hacking), conspiracy to commit wire fraud, and access device fraud.  

While the indictment and DOJ press release does not state if Turchin was arrested, BleepingComputer has been told by sources familiar with the case that local authorities detained him in Kazakhstan.

According to

The new Microsoft Defender Advanced Threat Protection (ATP) Web Content Filtering feature will be provided for free to all enterprise customers without the need for an additional partner license.

Web Content Filtering is part of  Microsoft Defender ATP’s Web protection capabilities and it allows security admins to design and deploy custom web usage policies across their entire organizations, making it simple to track and control access to websites based on their content category.

The feature is available on all major web browsers, with blocks performed by Network Protection (on Chrome and Firefox) and SmartScreen (on Edge).

Following feedback from customers

Two days after patches for critical F5 BIG-IP vulnerability were released, security researchers have started publicly posting proof-of-concept (PoC) exploits show how easy it is to exploit these devices.

F5 customers using BIG-IP devices and solutions include governments, Fortune 500 firms, banks, Internet services providers, and many consumer brands, including Microsoft, Oracle, and Facebook.

On Friday, F5 disclosed that they released patches for a critical 10/10 CVSSv3 rating vulnerability tracked as CVE-2020-5902

This vulnerability allows a remote attacker to access the Traffic Management User Interface (TMUI) of the BIG-IP application delivery controller (ADC) without authentication and perform remote code