Monthly Archives: August 2018

Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted

The Cryptocurrency Platform Atlas Quantum suffered a security breach, information belonging to more than 260,000 users was stolen by hackers. Hackers stole information related to over 260,000 users of the Cryptocurrency Platform Atlas […]

Posted in Cyber Security News | Comments Off on Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted

Android mobile devices from 11 vendors are exposed to AT Commands attacks

A group of researchers has conducted an interesting study on AT commands attacks on modern Android devices discovering that models of 11 vendors are at risk A group of researchers […]

Posted in Cyber Security News | Comments Off on Android mobile devices from 11 vendors are exposed to AT Commands attacks

SentinelOne Unveils H1 2018 Enterprise Risk Index Report

Report Highlights Prevalence of Ransomware and Rise of Fileless and PowerShell Attacks; Need for Next-Gen Endpoint Protection  by SentinelOne SentinelOne, the autonomous endpoint protection company, today announced the findings of its H1 2018 […]

Posted in Cyber Security News | Comments Off on SentinelOne Unveils H1 2018 Enterprise Risk Index Report

The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach

The restaurant chain Cheddar’s Scratch Kitchen suffered a payment card breach, hackers hacked the company network between Nov. 3, 2017 and Jan. 2, 2018 Once again here we are to […]

Posted in Cyber Security News | Comments Off on The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach

North Korea-linked Lazarus APT uses first Mac malware in cryptocurrency exchange attack

North Korea-linked Lazarus APT group leveraged for the first time on a MacOS variant of the Fallchill malware in a cryptocurrency exchange attack. According to Kaspersky, the North Korea-linked Lazarus group […]

Posted in Cyber Security News | Comments Off on North Korea-linked Lazarus APT uses first Mac malware in cryptocurrency exchange attack

Expert discovered a Critical Remote Code Execution flaw in Apache Struts (CVE-2018-11776)

Maintainers of the Apache Struts 2 open source development framework has released security updates to address a critical remote code execution vulnerability. Security updates released this week for the Apache Struts […]

Posted in Cyber Security News | Comments Off on Expert discovered a Critical Remote Code Execution flaw in Apache Struts (CVE-2018-11776)

Dark Tequila Banking malware targets Latin America since 2013

Kaspersky Labs detected a sophisticated piece of banking malware dubbed Dark Tequila that was used to target customers of several Mexican banks. Security experts from Kaspersky Labs have spotted a sophisticated […]

Posted in Cyber Security News | Comments Off on Dark Tequila Banking malware targets Latin America since 2013

2.6 billion records exposed in 2,308 disclosed data breaches in H1

According to a report from cyber threat intelligence firm Risk Based Security some 2.6. billion data records have been exposed in data breached in the first half of 2018. According to a […]

Posted in Cyber Security News | Comments Off on 2.6 billion records exposed in 2,308 disclosed data breaches in H1

Breaking News: Supply Chain Attack Operation Red Signature Targets South Korean Organizations

Trend Micro Research, along with researchers from IssueMakersLab, recently discovered a supply chain attack targeting South Korean organizations, named Operation Red Signature. The attack was targeted to specific IP ranges […]

Posted in Cyber Security News | Comments Off on Breaking News: Supply Chain Attack Operation Red Signature Targets South Korean Organizations

Unusual Malspam campaign targets banks with Microsoft Publisher files

Researchers from Trustwave have uncovered a malspam campaign targeting banks with the FlawedAmmyy RAT. The peculiarity of this malspam campaign is the unusual use of a Microsoft Office Publisher file to infect victims’ systems. Experts noticed an […]

Posted in Cyber Security News | Comments Off on Unusual Malspam campaign targets banks with Microsoft Publisher files

An Australian schoolboy hacked into Apple Servers and stole 90GB of secure files

According to Australian media, a teen hacker broke into Apple mainframe and downloaded 90GB of secure files. He dreams to work for the Tech Giant. I believe it is time […]

Posted in Cyber Security News | Comments Off on An Australian schoolboy hacked into Apple Servers and stole 90GB of secure files

Breaking News: NIST Small Business Cybersecurity Law

President Donald J. Trump has just signed the NIST Small Business Cybersecurity Act into law. Now part of the U.S. federal law S.770, it requires the director of the National […]

Posted in Cyber Security News | Comments Off on Breaking News: NIST Small Business Cybersecurity Law

Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of […]

Posted in Cyber Security News | Comments Off on Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

Beyond GDPR: key cyber security concerns

GDPR has now been in force for over two months and has brought with it a whole new approach to data privacy. Although the idea of protecting peoples’ personal data […]

Posted in Cyber Security News | Comments Off on Beyond GDPR: key cyber security concerns

FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive Thought Leadership Article  The practice of threat intelligence (TI) is gaining momentum, helping organizations of all […]

Posted in Cyber Security News | Comments Off on FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score of 9.9, On Friday, Oracle released security patches to address […]

Posted in Cyber Security News | Comments Off on Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]

Posted in Cyber Security News | Comments Off on DNS Hijacking targets Brazilian financial institutions

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]

Posted in Cyber Security News | Comments Off on DNS Hijacking targets Brazilian financial institutions

Some of the world’s biggest crimes go unnoticed, until it’s too late

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. […]

Posted in Cyber Security News | Comments Off on Some of the world’s biggest crimes go unnoticed, until it’s too late

Social Mapper – Correlate social media profiles with facial recognition

Trustwave developed Social Mapper an Open Source Tool that uses facial recognition to correlate social media profiles across different social networks. Security experts at Trustwave have released Social Mapper, a […]

Posted in Cyber Security News | Comments Off on Social Mapper – Correlate social media profiles with facial recognition

Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake news through group chats. WhatsApp, the most popular messaging application in the world, […]

Posted in Cyber Security News | Comments Off on Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, created by Ramnit operators. Security researchers at Checkpoint security have spotted a massive proxy botnet, […]

Posted in Cyber Security News | Comments Off on Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Duo Security created open tools and techniques to identify large Twitter botnet

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security […]

Posted in Cyber Security News | Comments Off on Duo Security created open tools and techniques to identify large Twitter botnet

A malware paralyzed TSMC plants where also Apple produces its devices

A virus has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories on Friday night, the plants where Apple produces its devices A malware has infected systems at several Taiwan Semiconductor […]

Posted in Cyber Security News | Comments Off on A malware paralyzed TSMC plants where also Apple produces its devices

Breaking Down the Door to Emergency Services through Cellular IoT Gateways

If configured incorrectly, cellular IoT gateways can give attacker access to critical infrastructure, threatening human life in ways only Hollywood has conceived. by Justin Shattuck, Scott Harvey, Sara Boddy & […]

Posted in Cyber Security News | Comments Off on Breaking Down the Door to Emergency Services through Cellular IoT Gateways

Russian troll factory suspected to be behind the attack against Italian President Mattarella

The Russian shadow behind the attack on Italian President Mattarella, a coordinated attack via Twitter involved hundreds of profiles inviting him to resign. Cybersecurity experts and Italian media believe that the […]

Posted in Cyber Security News | Comments Off on Russian troll factory suspected to be behind the attack against Italian President Mattarella

BAE Systems to Develop Automated Cyber Defense Tools for DARPA

By combining advanced machine learning and cyber-attack modeling, BAE Systems’ unique solution intends to automatically detect and defeat advanced cyber threats that could currently go undetected The U.S. Defense Advanced […]

Posted in Cyber Security News | Comments Off on BAE Systems to Develop Automated Cyber Defense Tools for DARPA

BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats

NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today released its 2018 NETSCOUT Threat Intelligence Report, offering globally scoped internet threat intelligence together with the analysis of our […]

Posted in Cyber Security News | Comments Off on BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats

Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018

Momentum Cyber is proud to release our Cybersecurity Mid-year Review for 2018. The mid-year report examines 1H’18 cybersecurity transactions and identifies trends that are impacting the dynamic and rapidly evolving cybersecurity landscape. […]

Posted in Cyber Security News | Comments Off on Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018

Are Your File Transfers Compliant with Data Security Laws?

It can be challenging to keep up with ever-changing compliance requirements. This year alone, PCI DSS released an update that applied to most organizations in card-processing industries, and the GDPR […]

Posted in Cyber Security News | Comments Off on Are Your File Transfers Compliant with Data Security Laws?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X