Share Blog Post
- The U.K's NCSC released updated guidance for employees using their personal devices for work. It encompasses the zero trust architectural approach and security challenges with BYOD.
- The White House sanctioned an order allowing the CISA to assess existing endpoint security deployments across federal agencies.
- The CISA released a new guidance document for federal agencies on how to secure networks while blocking remote users from illegally accessing internal resources.
- The Australian government laid out its Ransomware Action Plan, featuring a new set of standalone criminal offenses for ransomware actors, including those who target critical infrastructure.
- Ukrainian police detained a cybercriminal accused of turning 100,000 devices into a botnet to launch DDoS attacks and other malicious activities on behalf of his clients.
- Researchers at Purdue University created a self-aware algorithm that can fend off hacking attempts. This model sends one-time signals to each component and converts them into active monitoring systems.
- Thingiverse, a platform for sharing user-created digital design files, exposed a 36GB MySQL database containing 228,000 unique email addresses and user PII.
- The University of Sutherland in the U.K was hit by a cyberattack that tore down its IT systems. Online lectures remain inaccessible.
- According to a new report from Approov, APIs used in Fast Healthcare Interoperability and Resources (FHIR) apps are vulnerable to abuse, putting 4 million patient and clinician records at risk.
- A misconfigured Elasticsearch storage blob at Brazilian e-commerce firm Hariexpress exposed about 1.8 billion records, containing PII of customers as well as sellers.
- Unknown hackers allegedly targeted Olympus, forcing it to shut down its IT systems in the U.S, Latin America, and Canada.
- Microsoft reported a 2.4 Tbps DDoS attack via a botnet composed of about 70,000 devices, targeted at an Azure customer in Europe.
- Oregon Eye Specialists laid bare personal, financial, and medical information of customers in a breach involving unauthorized activity on employee email accounts.
- A joint advisory by the FBI, CISA, NSA, and EPA revealed that hackers attacked three U.S. water and wastewater treatment facilities this year. The attacks hit facilities in Nevada, Maine, and California in March, July, and August, respectively.
- A ransomware attack against the Hillel Yaffe Medical Center in Israel forced it to cancel non-urgent procedures as IT systems were disabled.
- Acer confirmed being hit by a security breach after hackers put over 60GB of company data, including customer details and login information, on sale on an infamous underground forum.
- Symantec Threat Hunter uncovered a new strain of ransomware, dubbed Yanluowang, targeting virtual machines in enterprises. Hackers further warned not to approach law enforcement for help.
- NCC Group observed a new threat actor, dubbed SnapMC, that steals data for carrying out data extortion attacks. Hackers use the Acunetix vulnerability scanner to hunt for flaws in VPN solutions and webserver apps.
- Juniper Threat Labs spotted Necro botnet, aka FreakOut, targeting a flaw in Visual Tools DVR systems and deploying Monero miners on compromised systems.
- Kaspersky unearthed a cyberespionage campaign exploiting a zero-day flaw in Windows to deliver MysterySnail malware and steal data. A connection to a Chinese-speaking APT IronHusky was also established.
- INKY experts reported a phishing attempt targeted at Verizon that involves the use of a mathematical symbol to bypass anti-phishing systems to acquire users’ Office365 credentials.
- Iran-linked hackers, DEV-0343, were found conducting extensive password spraying attacks against Office 365 accounts for defense technology and global maritime firms in the U.S. and Israel.
- The NSA clued in organizations against the use of wildcard TLS certificates that may lead to the new ALPACA TLS attack. It also jotted recommendations for securing web servers.
- Imperva stumbled across a browser extension called AllBlock that claims to block ads but also runs a background script—in every tab opened—to inject ads on Chrome or Opera.
Posted on: October 15, 2021
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.
Explore Industry Briefs
Cyware for Enterprise
Adopt next-gen security with threat intelligence analysis, security automation...
Cyware for ISACs/ISAOs
Anticipate, prevent, and respond to threats through bi-directional threat in...