Cybersecurity Challenges for the European Railways

The European Union Agency for Cybersecurity (ENISA) released in November 2020 its “Cybersecurity in Railways” report to raise awareness about the cybersecurity challenges facing Europe’s railways.

Google Chrome wants to fix your unsafe passwords

Too many people make the mistake of choosing weak passwords or reusing passwords used elsewhere – making life too easy for malicious hackers trying to gain unauthorized access.

U.S. National Cybersecurity Plan to Safeguard Maritime Sector

The U.S Government released on January 5, 2021, a cybersecurity plan to secure the nation’s maritime sector against cybersecurity threats that could endanger national security.

Ghidra 101: Slice Highlighting

Program slicing is a way of abstracting code into smaller groups of statements called slices. Slices are formed by following how a particular variable’s value affects or is affected by other variables

PLEASE_READ_ME Ransomware Campaign Targeting MySQL Servers

Guardicore first spotted the attack back in January 2020. After that, it witnessed a total of 92 attacks emanate from 11 IP addresses, with most based in Ireland and the UK at the time of analysis.

Back-to-Work Phishing Campaign Targeting Corporate Email Accounts

Abnormal Security detected one of the campaign’s attack emails that masqueraded as an internal notification from the recipient’s company by using spoofing techniques to disguise the sender address.

Successful Ransomware Attacks on Education Grew 388% in Q3 2020

Nine of the 31 ransomware attacks disclosed in the third quarter of the year involved data exfiltration, a tactic that has become common with ransomware gangs over the past year.

Australia Proposes Security Law to Protect Critical Infrastructure

The proposed laws will grant federal agencies power to “take direct action” against cyberattacks and obtain info from critical infrastructure entities if it is deemed to be in the national interest.
October 16, 2020

U.S. Federal Court Issues Restraining Order against Tech Support Scheme

The scheme used pop-up messages that disguised themselves as security alerts from Microsoft or other reputable tech companies to target primarily elderly consumers living in the United States.

JavaScript Used by Phishing Page to Steal Magento Credentials

Attackers created a Magento phishing page that used JavaScript to exfiltrate victims' login credentials. The page hosted what appeared to be a legitimate Magento 1.x login portal.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags