Daily Cybersecurity Roundup, September 21, 2020
With the gaming industry attracting hundreds of millions of users globally, gaming companies possessing huge amounts of user data have faced the wrath of cybercriminals. In a recent cyberattack at Activision, a major video game publisher, 500,000 users were left in limbo. In another vein, the College of the Nurses of Ontario suffered a cyberattack that allegedly compromised the personal information of thousands of nurses. Without further ado, let’s recap the top cybersecurity highlights from the weekend.
Over 500,000 Activision accounts, majorly used by Call of Duty players, were allegedly hacked and login credentials were leaked publicly by the attackers.
A cyberattack incident at the College of the Nurses of Ontario may have affected around 185,000 individuals, shutting down its services. A list of stolen documents was also spotted on the dark web.
An unwitting email blunder at the University of Tasmania exposed personal details, including PII of around 20,000 students, to all the faculties.
The names and personal details of over 1,000 high-ranking Belarusian police officers were leaked by a group of hackers, allegedly, in response to violent police crackdowns against anti-government protests.
Millions of users were impacted in a series of targeted DDoS attacks at Tutanota, an encrypted email service, that initially targeted the website and later its DNS providers.
The CISA issued an emergency directive for federal agencies to urgently patch a critical vulnerability in Windows Server that could allow attackers to hijack government networks.
Cisco examined MITRE ATT&CK data and revealed that cyber adversaries utilized defense evasion techniques and code execution techniques in 57% and 41% of the attacks, respectively.
A German research group found that security teams need to be re-trained under security and phishing awareness programs within six months to maintain their effectiveness.
According to an IBM report, Mozi botnet is responsible for 90% of the IoT network traffic observed between October 2019 and June 2020. During the attacks, the botnet did not seek to outdo competitors from compromised systems.
The Texas Department of Information Resources joined hands with FireEye, a cybersecurity vendor, to offer low-cost malware defense to state and local agencies across the country.