Monthly Archives: July 2018

Google bans cryptocurrency mining apps from the official Play Store

Google has updated the Play Store Developer Policy page to ban mobile mining apps that mine cryptocurrencies using the computational resources of the devices. Due to the surge in cryptocurrency […]

Posted in Cyber Security News | Comments Off on Google bans cryptocurrency mining apps from the official Play Store

10 Common File Transfer Risks and How to Avoid Them

Have you ever caught yourself saying one of the following? “We don’t have an IT department, so I FTP from my desktop.” “I don’t need special software to transfer files; […]

Posted in Cyber Security News | Comments Off on 10 Common File Transfer Risks and How to Avoid Them

Russian APT28 espionage group targets democratic Senator Claire McCaskill

The Russia-linked APT28 group targets Senator Claire McCaskill and her staff as they gear up for her 2018 re-election campaign. The Russian APT group tracked as Fancy Bear(aka APT28, Pawn Storm, Sofacy Group, Sednit, and STRONTIUM), that […]

Posted in Cyber Security News | Comments Off on Russian APT28 espionage group targets democratic Senator Claire McCaskill

Kronos Banking Trojan resurrection, new campaigns spotted in the wild

Researchers from Proofpoint have discovered a new variant of the infamous Kronos banking Trojan that was involved in several attacks in the recent months. The infamous Kronos banking Trojan is back, and according […]

Posted in Cyber Security News | Comments Off on Kronos Banking Trojan resurrection, new campaigns spotted in the wild

State of the SOC: How Does Yours Stack Up?

How does your company stack up against the state of the security operations center (SOC)? In its inaugural report on the topic, next-generation SIEM provider Exabeam surveyed a range of […]

Posted in Cyber Security News | Comments Off on State of the SOC: How Does Yours Stack Up?

Black Hat USA 2018 Addresses Needs of InfoSec Community with New Dedicated Track and Supporting Programs

BlackHat is expanding its community centric programming, developed to continue its service to the wider InfoSec industry. Over the past few years, Black Hat has made strategic steps in welcoming […]

Posted in Cyber Security News | Comments Off on Black Hat USA 2018 Addresses Needs of InfoSec Community with New Dedicated Track and Supporting Programs

DHS – Russian APT groups are inside US critical infrastructure

The US Government is warning of continuous intrusions in National critical infrastructure and it is blaming the Kremlin for the cyber attacks. According to the US Department of Homeland Security, […]

Posted in Cyber Security News | Comments Off on DHS – Russian APT groups are inside US critical infrastructure

Social Media Dangers: What You Must Know

by Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, Security+ The explosive rise of social media has inundated web users with an abundance of information. Social media platform provides the […]

Posted in Cyber Security News | Comments Off on Social Media Dangers: What You Must Know

Experts believe US Cyber Command it the only entity that can carry out ‘hack backs’

The U.S. government should opt to carry out hack backs as retaliation against the massive attacks against organizations in the US private sector. The U.S. government should opt to carry […]

Posted in Cyber Security News | Comments Off on Experts believe US Cyber Command it the only entity that can carry out ‘hack backs’

Experts discovered Calisto macOS Trojan, the member of Proton RAT family

Security experts from Kaspersky Lab have discovered a precursor of the infamous Proton macOS malware that was named Calisto. Malware researchers from Kaspersky Lab have discovered a malware, tracked as Calisto, that […]

Posted in Cyber Security News | Comments Off on Experts discovered Calisto macOS Trojan, the member of Proton RAT family

CSE Malware ZLab – Operation Roman Holiday – Hunting the Russian APT28

Researchers from the Z-Lab at CSE Cybsec analyzed a new collection of malware allegedly part of a new espionage campaign conducted by the APT28 group. It was a long weekend […]

Posted in Cyber Security News | Comments Off on CSE Malware ZLab – Operation Roman Holiday – Hunting the Russian APT28

Operation Eligible Receiver – The Birthplace of Cybersecurity: Configurations

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of […]

Posted in Cyber Security News | Comments Off on Operation Eligible Receiver – The Birthplace of Cybersecurity: Configurations

ZoomEye IoT search engine cached login passwords for tens of thousands of Dahua DVRs

A security researcher discovered that the IoT search engine ZoomEye has cached login passwords for tens of thousands of Dahua DVRs. The IoT search engine ZoomEye has cached login passwords for […]

Posted in Cyber Security News | Comments Off on ZoomEye IoT search engine cached login passwords for tens of thousands of Dahua DVRs

Staying in Front of the Everchanging Cybersecurity Landscape

Like oxygen, the internet is everywhere, and is vital to the corporate ecosystem. Put simply, the internet is the lifeblood of today’s enterprise organizations, and there is a universal reliance […]

Posted in Cyber Security News | Comments Off on Staying in Front of the Everchanging Cybersecurity Landscape

2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1

Upgrade to an Encrypted SMB version 3 – avoid the next WannaCry (which exploited SMBv1) by Tal Widerman, Marketing Manager , Visuality Systems 2018 is Late but Still the Right […]

Posted in Cyber Security News | Comments Off on 2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1

Spambot aims at targets WordPress sites in World Cup-Themed spam scam

Imperva observed a spambot targeting WordPress sites aimed at tricking victims into clicking on links to sites offering betting services on FIFA World Cup Security experts from Imperva recently observed a […]

Posted in Cyber Security News | Comments Off on Spambot aims at targets WordPress sites in World Cup-Themed spam scam

Facebook faces £500,000 fine in the U.K. over Cambridge Analytica scandal

Facebook has been fined £500,000 ($664,000) in the U.K. for its conduct in the Cambridge Analytica privacy scandal. Facebook has been fined £500,000 in the U.K., the maximum fine allowed by the UK’s […]

Posted in Cyber Security News | Comments Off on Facebook faces £500,000 fine in the U.K. over Cambridge Analytica scandal

Polar fitness app broadcasted sensitive data of intelligence and military personnel

The Mobile fitness app Polar has suspended its location tracking feature due to the leakage of sensitive data on military and intelligence personnel. A new privacy incident involved Fitness application […]

Posted in Cyber Security News | Comments Off on Polar fitness app broadcasted sensitive data of intelligence and military personnel

How to Protect Your Organization from Spear Phishing

In April 2018, IT Governance reported that 75% of organizations have experienced “at least one” phishing attack. While most businesses are used to dealing with spam—it often seems like getting […]

Posted in Cyber Security News | Comments Off on How to Protect Your Organization from Spear Phishing

New Rakhni variant could infect systems with either a ransomware or a miner

Security researchers at  Kaspersky Labs have discovered a new strain of the Rakhni malware that could infect systems with either a ransomware or a cryptocurrency miner. Experts from Kaspersky Labs have discovered a new strain […]

Posted in Cyber Security News | Comments Off on New Rakhni variant could infect systems with either a ransomware or a miner

Chinese hackers breached into systems at Australian National University … and are still there

Chinese hackers breached into the systems of Australian National University (ANU) and according to the experts they are still there. Chinese hackers continue to target organizations worldwide, this time attackers based […]

Posted in Cyber Security News | Comments Off on Chinese hackers breached into systems at Australian National University … and are still there

Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation

Crooks leverage an alternative scheme to mine cryptocurrencies, they don’t inject the CoinHive JavaScript miner directly into compromised websites. Security researchers at MalwareLabs have uncovered a new crypto mining campaign […]

Posted in Cyber Security News | Comments Off on Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation

Huawei enterprise and broadcast products have a crypto bug. Fix it now!

Huawei has rolled out security fixes for some enterprise and broadcast products to address a cryptography issue tracked as CVE-2017-17174. Huawei has released security updates for some enterprise and broadcast […]

Posted in Cyber Security News | Comments Off on Huawei enterprise and broadcast products have a crypto bug. Fix it now!

The Social network giant Facebook confirms it shared data with 61 tech firms after 2015

On Friday, Facebook provided a 748-page long report to Congress that confirms the social network shared data with at least 61 tech firms after 2015. This is the worst period in the […]

Posted in Cyber Security News | Comments Off on The Social network giant Facebook confirms it shared data with 61 tech firms after 2015

Does your office security system have the power of foresight?

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and […]

Posted in Cyber Security News | Comments Off on Does your office security system have the power of foresight?

Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking

The maintainers of the Trezor multi-cryptocurrency wallet service reported a phishing attack against some of its users that occurred during the weekend. I had some issues yesterday, when accessing your […]

Posted in Cyber Security News | Comments Off on Trezor users targeted by phishing attacks, experts blame DNS Poisoning or BGP Hijacking

Security Risks of the Instant Gratification Culture

by Javvad Malik, security advocate, AlienVault Gone are the days where one would write a letter, post it, and wait a couple of days for it to be delivered. These […]

Posted in Cyber Security News | Comments Off on Security Risks of the Instant Gratification Culture

Data Broker Exactis data breach, the biggest ever, exposes millions of Americans

Security expert Vinny Troia has found a huge trove of data belonging to millions of Americans that were left unsecured online.  The security researcher Vinny Troia was analyzing the level […]

Posted in Cyber Security News | Comments Off on Data Broker Exactis data breach, the biggest ever, exposes millions of Americans

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X