• University of Texas First Ever to Offer Cybersecurity Certification in Healthcare
    The course will be built around multiple thematic modules including "Processes to Ensure Organizational Safety and Security" and "Policies and Governance in Healthcare Entities." The eight-week program graduated a pilot class of 16 participants in August 2019, and it plans its first official batch in spring 2020.Read More
  • Looking Back At Major Magecart Attacks Witnessed This Year
    Magecart card-skimming attacks have been in the news quite often this year. This attack involves the hacker injecting malicious code to harvest sensitive information from online payment forms.Read More
  • New Hacking Techniques Discovered In 2019 So Far
    Warshipping is a new form of existing hacking methods such as wardialing and wardriving. Spearphone is a new type of attack that can enable threat actors to eavesdrop on people’s mobile phone calls.Read More
  • Attackers Hide Behind Trusted Domains To Trick Victims
    With security defenses improving, attackers are finding ways to hide behind trusted domains. Hackers are looking to give potential victims a sense of false security to encourage them to click on links.Read More
  • FIN7 Threat Group Adds Two New Tools to Its Arsenal
    The FIN7 threat group has added two new tools to its malware arsenal, namely BOOSTWRITE and RDFSNIFFER. BOOSTWRITE is a dropper that decrypts and loads two payload DLLs, namely CARBANAK backdoor and RDFSNIFFER.Read More
  • ISF Analyzes Artificial Intelligence Prospects For Information Security
    This paper details exactly what AI is, the opportunities of using AI in security and cyber defenses, as well as the impact of AI on information security. Researchers noted that the AI tools and systems used in cyber defenses are also available to malicious actors that can be used to create new threats.Read More
  • Australian Cyber Security Center Publishes Cybersecurity Guide For Small Businesses
    The Australian Cyber Security Center (ACSC) has published a cybersecurity guide for small businesses. It provides information about common cybersecurity incidents and how to defend against them.Read More
  • Cyber Social Value Helps Mitigate Cybersecurity Problems, Researchers Say
    This new approach to the cybersecurity ecosystem helps mitigate “Five I” problems such as Cyber Insecurity, Cyber Incompetence, Cyber Intransigence, Cyber Ignorance, and Cyber Insensitivity. Moreover, this new approach will enhance protection from information threats, such as malicious campaigns, disinformation campaigns, and information stealing campaigns that destroy national confidence.Read More
  • CISA Official Offers Details into China-Led Attacks of U.S. Managed Service Providers
    The Cybersecurity and Infrastructure Security Agency’s cyber threat analysis chief shared fresh details this week around an ongoing campaign of cyberattacks linked to the Chinese government, specifically targeting managed service providers. “The core issue with the compromise of managed service providers is that it really gives the attacker a force-multiplier effect,” CISA’s Rex Booth said at a summit hosted by FCW Thursday. Since 2006, the Homeland Security Department has tracked a threat group, commonly known in the security industry as APT10, which Booth noted is sponsored by the Ministry of State Security in China. Between 2014 to 2018, the agency noticed a strategic shift in the threat group's tactics: The hackers began specifically targeting America’s managed services providers, or MSPs. “Now, when you are looking at the opportunity for the attackers to tackle these MSPs, it’s a much more difficult thing to scope out and scale,” Booth said.Read More
  • Convincing new Commonwealth Bank scam scrapes victims’ card details
    If you’re one of the 15.9 million customers with the Commonwealth Bank, you should be careful of any emails from the bank – even if they look authentic. A new email scam that parades as the Commonwealth Bank seeks to scrape victims’ card details and hack into their bank account, but it’s extremely hard to spot the signs it’s a scam. “Exercise caution if you receive an email supposedly from Commonwealth Bank – the bank has been spoofed via a new multi-staged phishing email scam,” MailGuard said. Source: Mailguard More Source: Mailguard More Source: Mailguard MoreRead More
  • Military Warns of Iranian Hackers Targeting American Troops with Fake Jobs Website
    WASHINGTON -- U.S. military officials warned troops last week that Iranian hackers have set up a fake jobs website for veterans that targets service members considering a transition back to civilian life. A National Guard Bureau memorandum dated last Wednesday warns service members to stay away from the website called "Hire Military Heroes," which appears to offer them assistance finding a job outside the Defense Department via a web application that visitors are encouraged to download. "They're targeting active service members looking for jobs with the promise of offering assistance for civilian employment once their service ends," the memo states. "The hackers are hoping one of their targets would use a DoD system to download and run the malware." Officials have determined the chances that the group of the hackers, known as Tortoiseshell, successfully gains access to Defense Department systems is unlikely, but nonetheless issued the guidance last week labeling the matter a high risk.Read More
  • Google Patches 8 Vulnerabilities in Chrome 77
    Google this week announced an update for Chrome 77 that addresses 8 security vulnerabilities in the application, including 5 reported by external researchers. The new browser update arrives only a couple of weeks after Google patched four security flaws with the release of Chrome 77.0.3865.90, including two vulnerabilities that, combined with another type of weakness, could result in a sandbox escape. The five externally reported bugs addressed this week are rated High severity and brought the reporting researchers a total of $45,000 in bug bounty rewards. The third vulnerability addressed this week is CVE-2019-13695, a use-after-free in an audio component that was reported by Man Yue Mo of Semmle Security Research Team and which was awarded a $15,000 bug bounty reward. The last of the externally reported flaws addressed in the new Chrome version is a cross-origin size leak tracked as CVE-2019-13697 and reported by Luan Herrera. Overall, Google has paid over $110,000 in bug bounties to the external security researchers who reported vulnerabilities patched in Chrome 77.Read More
  • Monterey Health Center Provides Notice of Data Security Incident
    While Monterey Health Center is unaware of any attempted or actual misuse of personal information in relation to the event, they are providing potentially affected individuals with notice of the event, their response to it, and steps individuals may take to better protect against the possibility of identity theft and fraud, should they feel it is necessary to do so. Because the server that was encrypted stored patient medical records, Monterey Health Center worked quickly to (1) restore access to the patient information so they could continue to care for patients without disruption; and (2) investigate what happened and whether this incident resulted in any unauthorized access to, or theft of, patient information by the unknown actor. Unfortunately, after an extensive investigation, Monterey Health Center was unable to determine whether this incident resulted in unauthorized access to patient information. Although Monterey Health Center has no indication that any patient information was viewed or stolen by an unauthorized actor, it is notifying potentially affected individuals about this incident in an abundance of caution due to the uncertain nature of the incident.Read More
  • Microsoft and NIST partner to create enterprise patching guide
    Microsoft and the US National Institute of Standards and Technology (NIST) have joined forces to create a NIST guide for applying security patches in the enterprise sector. The result of this work will be a NIST Special Publication 1800 practice guide that system administrators can follow to organize or optimize a company's internal patching procedures. "Microsoft visited a significant number of customers in person (several of which I personally joined) to share what we learned [...] and to have some really frank and open discussions to learn why organizations really aren't applying security patches," the Microsoft exec said. One of the primary reasons invoked in these meetings was that companies didn't have a patch testing procedure in place, and many were delaying patches in order to make sure bugs or crashes wouldn't cause downtime in production systems. Simos said that in some organizations, the process of testing a patch "consisted solely of asking whether anyone else had any issues with the patch in an online forum."Read More
  • These are the 29 countries vulnerable to Simjacker attacks
    Adaptive Mobile -- the cyber-security company that discovered the Simjacker attack -- published today a list of countries where local mobile operators ship SIM cards vulnerable to Simjacker. But besides listing all the countries where mobile operators have misconfigured SIM cards and have left the S@T Browser app open to attacks, Adaptive Mobile also revealed the countries where it detected attacks. Even though Simjacker allowed for a broad spectrum of operations, Adaptive Mobile said the attack had only been used to track users' locations, and nothing more. The app will be able to tell users if they have the S@T Browser app installed on their SIM card, and if the app has been misconfigured and left vulnerable to Simjacker attacks. In addition, Adaptive Mobile also looked into WIBattack, a Simjacker-like attack that was disclosed at the end of September, and which works in the same way, but targets the WIB app installed on SIM cards, instead of S@T Browser.Read More
  • Estonia to strengthen cybersecurity cooperation with Germany
    Source: Xinhua| 2019-10-11 23:14:32|Editor: yan TALLINN, Oct. 11 (Xinhua) -- Estonian Prime Minister Juri Ratas on Friday said that his country expects to work together with Germany even more in the area of cybersecurity. At a meeting with visiting German Defense Minister Annegret Kramp-Karrenbauer at his office, Ratas said that "Thinking of the future, we have very many similar interests regarding cybersecurity, and this is an area where we could work together even more." Ratas and Kramp-Karrenbauer discussed "the strong historical bonds as well as very close cooperation in the modern day" between the two countries as dedicated allies in the North Atlantic Treaty Organization (NATO) as well as the European Union, said the Estonian government statement. "As partners, we both want our future Europe to be a safe and good place to live in," Ratas was quoted as saying. "We are certainly interested in Germany's experience with high technology and innovative research and development activities," said the Estonian prime minister.Read More
  • Juniper Networks addresses 84 bugs, including 31 critical ones
    Juniper Networks this week issued 27 software security advisories covering 84 product vulnerabilities, 31 of them critical. All of the critical flaws were listed in a single security advisory that detailed 53 vulnerabilities in its Contrail Networking cloud network automation product. Two of the bugs were assessed a maximum 10.0 CVSS base score: a path traversal vulnerability that “allows copying and overwriting files outside of the specified destination in the local ansible controller host,” (CVE-2019-3828) and a vulnerability that could enable remote attackers to conduct server-side request forgery attacks (CVE-2018-14721). Juniper resolved the various flaws in release version 1910. A number of other products had vulnerabilities patched as well, including Junos OS, NFX Series, CTPView and CTP Series, SBR Carrier and SRX5000 Series. Network Security VulnerabilitiesRead More
  • Leafly Cannabis Website Leaked User Info via Exposed Database
    Cannabis information platform Leafly sent notification emails to some of its customers letting them know that some of their information was exposed in a data leak incident. Leafly is "the world’s largest cannabis information resource" as the company says in a press release released four days ago and it "helps people discover, find, and buy cannabis and empowers cannabis businesses to attract and retain loyal customers through advertising and technology services,"  "With 10 million monthly active users and 1.4 million user-generated strain, product, and dispensary reviews, Leafly has the largest and fastest-growing audience in the cannabis industry," also says a press release from June 2019. Users' credit card information was not exposed Leafly discovered on September 30 that customer information stored within user records from July 2, 2016, was exposed by a secondary database. "On September 30, we teamed that a set of Leafly user records dated July 2, 2016 held in a secondary Leafly database was disclosed without permission.Read More