Monthly Archives: May 2018

At least 90,000 Canadian bank customers may have been affected by two data breach

On Monday, Two Canada’s five largest banks, the Bank of Montreal (BMO) and Simplii Financial, informed their customers they are investigating a data breach. The security breach suffered by the Bank of Montreal […]

Posted in Cyber Security News | Comments Off on At least 90,000 Canadian bank customers may have been affected by two data breach

GDPR and Beyond: Prepare to Lead Through The Complex Future of Privacy Regulation

As of May 25th, the European Union’s General Data Protection Regulation (GDPR) became the law of the land. And in a digital age where data knows no national boundaries, it’s […]

Posted in Cyber Security News | Comments Off on GDPR and Beyond: Prepare to Lead Through The Complex Future of Privacy Regulation

The Cobalt Hacking crew is still active even after the arrest of its leader

Group-IB has released a new report on Cobalt group’s attacks against banks and financial sector organizations worldwide after the arrest of its leader. Threat intelligence firm Group-IB published an interesting report titiled […]

Posted in Cyber Security News | Comments Off on The Cobalt Hacking crew is still active even after the arrest of its leader

Coca-Cola data breach has affected about 8,000 workers

Coca-Cola discovered a security breach in September when law enforcement officials notified it that a former employee at a Coca-Cola subsidiary was found in possession of an external hard drive containing worker […]

Posted in Cyber Security News | Comments Off on Coca-Cola data breach has affected about 8,000 workers

Justice Department announces actions to disrupt the VPNFilter botnet

The Justice Department announced an effort to disrupt the VPNFilter botnet of hundreds of thousands of infected home and office (SOHO) routers and other networked devices under the control of […]

Posted in Cyber Security News | Comments Off on Justice Department announces actions to disrupt the VPNFilter botnet

Tech giants are all working on new Spectre and Meltdown attacks, so-called variant 3 and variant 4

Yesterday AMD, ARM, IBM, Intel, Microsoft and other major tech firms released updates, mitigations and published security advisories for two new variants of Meltdown and Spectre attacks. Spectre and Meltdown made the […]

Posted in Cyber Security News | Comments Off on Tech giants are all working on new Spectre and Meltdown attacks, so-called variant 3 and variant 4

Chinese researchers from Tencent discovered exploitable flaws in several BMW models

A team of security researchers from Chinese firm Tencent has discovered 14 security vulnerabilities in several BMW models. Researchers from the Tencent Keen Security Lab have discovered 14 vulnerabilities affecting […]

Posted in Cyber Security News | Comments Off on Chinese researchers from Tencent discovered exploitable flaws in several BMW models

Exclusive Interview: The Future of Cybersecurity with Dr. David G. DeWalt

UNDERSTANDING THE FUTURE OF CYBERSECURITY When you finish reading this article, and I recommend you read it two or three times, you will have a keen understanding of where the […]

Posted in Cyber Security News | Comments Off on Exclusive Interview: The Future of Cybersecurity with Dr. David G. DeWalt

Misconfigured CalAmp server allowed hacker to take over a lot of vehicles

Security researchers discovered that a misconfigured server operated by the CalAmp company could allow anyone to access account data and takeover the associated vehicle. CalAmp is a company that provides backend services […]

Posted in Cyber Security News | Comments Off on Misconfigured CalAmp server allowed hacker to take over a lot of vehicles

Cyber Cities Insecurities: Breaking News: Ranking America’s Most Insecure Metros

Cybersecurity in the City: Ranking America’s Most Insecure Metros is a first-time report issued by Coronet, a provider of enterprise-grade cloud security to companies of any size. From December 2017 […]

Posted in Cyber Security News | Comments Off on Cyber Cities Insecurities: Breaking News: Ranking America’s Most Insecure Metros

The countdown is on — are you and your organization ready for GDPR?

With all eyes on privacy rights, forward-looking businesses are re-examining their social media, e-commerce and data mining strategies and looking for new ways forward. Motivating factors include the Facebook Cambridge […]

Posted in Cyber Security News | Comments Off on The countdown is on — are you and your organization ready for GDPR?

Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican Banks

The head of the Mexican central bank, Alejandro Diaz de Leon announced this week that hackers were involved in shadowy transfers of between $18 million and $20 million. Mexican central […]

Posted in Cyber Security News | Comments Off on Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican Banks

Nethammer – Exploiting Rowhammer attack through network without a single attacker-controlled line of code

Nethammer attack technique is the first truly remote Rowhammer attack that doesn’t require a single attacker-controlled line of code on the targeted system. A few days ago security experts announced the first network-based remote […]

Posted in Cyber Security News | Comments Off on Nethammer – Exploiting Rowhammer attack through network without a single attacker-controlled line of code

Root Cause Analysis: Phishing Attacks…Solution? Read on…

Stopping the #1 Source of Exploitation:  Spear Phishing in Depth Again, Inky® receives another award, two years in a row.  You’re still wondering who they are and why they are […]

Posted in Cyber Security News | Comments Off on Root Cause Analysis: Phishing Attacks…Solution? Read on…

CyberDefense.TV – An Upcoming Media Platform – First Peek

Television Media Platform for InfoSec Knowledge CEO/Executive Hotseats – Totally Unscripted – Starting in 2018 Imagine you could sit down with the CEO and/or Founder of some of the hottest, […]

Posted in Cyber Security News | Comments Off on CyberDefense.TV – An Upcoming Media Platform – First Peek

Operation Hotel – Ecuador spent millions on spy operation for Julian Assange

According to The Guardian newspaper, Ecuador spent millions on spy operation for Julian Assange after he hacked the embassy network. According to a report published by the Guardian, Ecuador spied on WikiLeaks […]

Posted in Cyber Security News | Comments Off on Operation Hotel – Ecuador spent millions on spy operation for Julian Assange

Rail Europe North America hit by payment card data breach

Rail Europe North America (RENA) notifies customers of a security breach, crooks compromised its website with a malware used to siphon payment card data. The website allows users to buy European train tickets, […]

Posted in Cyber Security News | Comments Off on Rail Europe North America hit by payment card data breach

Researchers disclosed details of EFAIL attacks on in PGP and S/MIME tools researchers. Experts believe claims are overblown

EFAIL attacks – Researchers found critical vulnerabilities in PGP and S/MIME Tools, immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email. A few hours ago, I reported the news that […]

Posted in Cyber Security News | Comments Off on Researchers disclosed details of EFAIL attacks on in PGP and S/MIME tools researchers. Experts believe claims are overblown

The source code of the TreasureHunter PoS Malware leaked online

Security experts at Flashpoint confirmed the availability online for the source code of the TreasureHunter PoS malware since March. The researchers found evidence that the threat has been around since at least late […]

Posted in Cyber Security News | Comments Off on The source code of the TreasureHunter PoS Malware leaked online

Misinterpretation of Intel docs is the root cause for the CVE-2018-8897 flaw in Hypervisors and Oss

Developers of major operating systems and hypervisors misread documentation from Intel and introduced a the CVE-2018-8897 vulnerability into to their products. The development communities of major operating systems and hypervisors […]

Posted in Cyber Security News | Comments Off on Misinterpretation of Intel docs is the root cause for the CVE-2018-8897 flaw in Hypervisors and Oss

Signal disappearing messages can be recovered by the macOS client

The macOS client for the Signal fails to properly delete disappearing messages from the recipient’s system, potentially exposing sensitive messages. Signal is considered the most secure instant messaging app, searching for […]

Posted in Cyber Security News | Comments Off on Signal disappearing messages can be recovered by the macOS client

baseStriker attack technique allow to bypass Microsoft Office 365 anti-phishing filter

The baseStriker attack technique allows to bypass anti-phishing filters by splitting and disguising a malicious link using a tag called the <base> URL tag. Security researchers at cloud security company […]

Posted in Cyber Security News | Comments Off on baseStriker attack technique allow to bypass Microsoft Office 365 anti-phishing filter

Spotlight – Rising Above The Cyber Noise

SPECIAL REPORT: Case Study: Neil Daniell, Information Security Specialist at Peoples Bancorp Cyber attacks on the banking industry are growing more sophisticated, frequent, and dynamic. This includes risks from distributed denial-of-service […]

Posted in Cyber Security News | Comments Off on Spotlight – Rising Above The Cyber Noise

The Seven Stages of GDPR Compliance

The European Union’s General Data Protection Regulation (GDPR) becomes law in just a matter of weeks. This far-reaching regulation shifts the focus of ownership of data back to individuals – […]

Posted in Cyber Security News | Comments Off on The Seven Stages of GDPR Compliance

Defending The Digital Frontline

Cyber threats continue to originate from a wide variety (and ever-multiplying) range of entities from state-sponsored groups and terrorists to criminal elements and emerging hacktivist movements. As these groups exercise […]

Posted in Cyber Security News | Comments Off on Defending The Digital Frontline

European Central Bank announced a framework for cyber attack simulation on financial firms

Last week, the European Central Bank has published the European framework for testing financial sector resilience to cyber attacks. The framework aims to simulate the effects of cyber attacks on critical systems […]

Posted in Cyber Security News | Comments Off on European Central Bank announced a framework for cyber attack simulation on financial firms

The Pentagon bans Huawei and ZTE phones from stores on military bases

The Pentagon is ordering retail outlets on US military bases to stop selling Huawei and ZTE products due to unacceptable security risk they pose. Smartphones manufactured by Chinese firms Huawei and […]

Posted in Cyber Security News | Comments Off on The Pentagon bans Huawei and ZTE phones from stores on military bases

FacexWorm targets cryptocurrency users and spreads through Facebook Messenger

Social networks could be a privileged attack vector to rapidly spread a malware to a huge audience, FacexWorm targets cryptocurrency users by spreading through Facebook Messenger. Social networks could be […]

Posted in Cyber Security News | Comments Off on FacexWorm targets cryptocurrency users and spreads through Facebook Messenger

SamSam operators switch tactic and are more focused on targeted organizations

SamSam ransomware made the headlines again, crooks now spreading thousands of copies of the ransomware at once into individual targeted organizations. Ransomwarecontinues to be one of the most dangerous cyber […]

Posted in Cyber Security News | Comments Off on SamSam operators switch tactic and are more focused on targeted organizations

Innovations in MSSP: Tying Together Tools and Processes

I’ve been following the Managed Security Service Provider (MSSP) market for some time. I’m always looking for innovators and those who understand how to harness ‘big data’ to their advantage. […]

Posted in Cyber Security News | Comments Off on Innovations in MSSP: Tying Together Tools and Processes

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X