Monthly Archives: August 2018
Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted
The Cryptocurrency Platform Atlas Quantum suffered a security breach, information belonging to more than 260,000 users was stolen by hackers. Hackers stole information related to over 260,000 users of the Cryptocurrency Platform Atlas […]
Android mobile devices from 11 vendors are exposed to AT Commands attacks
A group of researchers has conducted an interesting study on AT commands attacks on modern Android devices discovering that models of 11 vendors are at risk A group of researchers […]
SentinelOne Unveils H1 2018 Enterprise Risk Index Report
Report Highlights Prevalence of Ransomware and Rise of Fileless and PowerShell Attacks; Need for Next-Gen Endpoint Protection by SentinelOne SentinelOne, the autonomous endpoint protection company, today announced the findings of its H1 2018 […]
The restaurant chain Cheddar’s Scratch Kitchen has suffered a payment card breach
The restaurant chain Cheddar’s Scratch Kitchen suffered a payment card breach, hackers hacked the company network between Nov. 3, 2017 and Jan. 2, 2018 Once again here we are to […]
North Korea-linked Lazarus APT uses first Mac malware in cryptocurrency exchange attack
North Korea-linked Lazarus APT group leveraged for the first time on a MacOS variant of the Fallchill malware in a cryptocurrency exchange attack. According to Kaspersky, the North Korea-linked Lazarus group […]
Expert discovered a Critical Remote Code Execution flaw in Apache Struts (CVE-2018-11776)
Maintainers of the Apache Struts 2 open source development framework has released security updates to address a critical remote code execution vulnerability. Security updates released this week for the Apache Struts […]
Dark Tequila Banking malware targets Latin America since 2013
Kaspersky Labs detected a sophisticated piece of banking malware dubbed Dark Tequila that was used to target customers of several Mexican banks. Security experts from Kaspersky Labs have spotted a sophisticated […]
2.6 billion records exposed in 2,308 disclosed data breaches in H1
According to a report from cyber threat intelligence firm Risk Based Security some 2.6. billion data records have been exposed in data breached in the first half of 2018. According to a […]
Breaking News: Supply Chain Attack Operation Red Signature Targets South Korean Organizations
Trend Micro Research, along with researchers from IssueMakersLab, recently discovered a supply chain attack targeting South Korean organizations, named Operation Red Signature. The attack was targeted to specific IP ranges […]
Unusual Malspam campaign targets banks with Microsoft Publisher files
Researchers from Trustwave have uncovered a malspam campaign targeting banks with the FlawedAmmyy RAT. The peculiarity of this malspam campaign is the unusual use of a Microsoft Office Publisher file to infect victims’ systems. Experts noticed an […]
An Australian schoolboy hacked into Apple Servers and stole 90GB of secure files
According to Australian media, a teen hacker broke into Apple mainframe and downloaded 90GB of secure files. He dreams to work for the Tech Giant. I believe it is time […]
Breaking News: NIST Small Business Cybersecurity Law
President Donald J. Trump has just signed the NIST Small Business Cybersecurity Act into law. Now part of the U.S. federal law S.770, it requires the director of the National […]
Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities
More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose of the exercise was to test the response capabilities of critical Department of […]
Beyond GDPR: key cyber security concerns
GDPR has now been in force for over two months and has brought with it a whole new approach to data privacy. Although the idea of protecting peoples’ personal data […]
FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER
by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive Thought Leadership Article The practice of threat intelligence (TI) is gaining momentum, helping organizations of all […]
Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!
Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has received a CVSS score of 9.9, On Friday, Oracle released security patches to address […]
DNS Hijacking targets Brazilian financial institutions
Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]
DNS Hijacking targets Brazilian financial institutions
Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying out DNS hijacking. Crooks are targeting DLink DSL modem routers in Brazil to […]
Some of the world’s biggest crimes go unnoticed, until it’s too late
As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing day. […]
Social Mapper – Correlate social media profiles with facial recognition
Trustwave developed Social Mapper an Open Source Tool that uses facial recognition to correlate social media profiles across different social networks. Security experts at Trustwave have released Social Mapper, a […]
Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats
WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake news through group chats. WhatsApp, the most popular messaging application in the world, […]
Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet
Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, created by Ramnit operators. Security researchers at Checkpoint security have spotted a massive proxy botnet, […]
Duo Security created open tools and techniques to identify large Twitter botnet
Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security […]
A malware paralyzed TSMC plants where also Apple produces its devices
A virus has infected systems at several Taiwan Semiconductor Manufacturing Co. (TSMC) factories on Friday night, the plants where Apple produces its devices A malware has infected systems at several Taiwan Semiconductor […]
Breaking Down the Door to Emergency Services through Cellular IoT Gateways
If configured incorrectly, cellular IoT gateways can give attacker access to critical infrastructure, threatening human life in ways only Hollywood has conceived. by Justin Shattuck, Scott Harvey, Sara Boddy & […]
Russian troll factory suspected to be behind the attack against Italian President Mattarella
The Russian shadow behind the attack on Italian President Mattarella, a coordinated attack via Twitter involved hundreds of profiles inviting him to resign. Cybersecurity experts and Italian media believe that the […]
BAE Systems to Develop Automated Cyber Defense Tools for DARPA
By combining advanced machine learning and cyber-attack modeling, BAE Systems’ unique solution intends to automatically detect and defeat advanced cyber threats that could currently go undetected The U.S. Defense Advanced […]
BREAKING NEWS: NETSCOUT Threat Intelligence Report Highlights Evolution of Internet Scale Threats
NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, today released its 2018 NETSCOUT Threat Intelligence Report, offering globally scoped internet threat intelligence together with the analysis of our […]
Breaking News: CYBERSECURITY MID-YEAR REVIEW | 1H 2018
Momentum Cyber is proud to release our Cybersecurity Mid-year Review for 2018. The mid-year report examines 1H’18 cybersecurity transactions and identifies trends that are impacting the dynamic and rapidly evolving cybersecurity landscape. […]
Are Your File Transfers Compliant with Data Security Laws?
It can be challenging to keep up with ever-changing compliance requirements. This year alone, PCI DSS released an update that applied to most organizations in card-processing industries, and the GDPR […]