• Cyber Threats To The Maritime Sector
    Cyber threats in the maritime industry refer to the threats to computer systems and technology that can affect shipping-related operations. With the sector actively adopting various technologies to improve efficiency, cyber threats must be proactively addressed.Read More
  • Counting Most Critical Vulnerabilities Discovered In 2019 So Far
    NetCAT is a new vulnerability in Intel Chips that abuses the Data-Direct I/O (DDIO) feature. URGENT/11 is a total of 11 vulnerabilities that impact VxWorks operating system.Read More
  • An Updated Version Of California Consumer Privacy Act To Go Into Effect On January 1, 2020
    CCPA will give consumers more control over how companies collect and manage their personal data. The CCPA applies to firms that collect California’s residents’ personal information or do business in California.Read More
  • Understanding The Threat Landscape For Managed Service Providers
    Given the potential for threat actors to monetize from an MSP’s large clients, ransomware attacks has become a common attack vector against MSPs. MSPs with high-value targets as customers can be a lucrative point for APT attacks.Read More
  • What You Need To Know About Tax Scams
    Taxpayers have been observed to be a popular target for cyberattacks. Most scams impersonate IRS officials to convince victims into giving them funds or sensitive information.Read More
  • New Tarmac Malware Targets MacOS Users
    Researchers have discovered a new Mac malware dubbed Tarmac that is distributed via malvertising campaigns. Details about all the features of this new malware are yet to be discovered.Read More
  • An Essential Sender Policy Framework (SPF) Guide For You
    With the rise in phishing emails from malicious senders, SPF becomes essential than ever. It is a simple email-validation system that is devised to detect email spoofing.Read More
  • Different Bluetooth Hacking Techniques That You Should Know To Prevent Loss Of Data
    Apart from attack techniques, threat actors can also leverage vulnerabilities in Bluetooth implementations to gain access to victims’ devices. Some of the known vulnerabilities are BlueBorne and Bleedingbit.Read More
  • The Netherlands Releases a Tour de Force on International Law in Cyberspace
    These include the obligations of states vis-a-vis sovereignty, non-intervention, the use of force, due diligence, international humanitarian law (IHL), and international human rights law (IHRL), as well as attribution of cyber operations and the core responses to hostile cyber operations that international law makes available. It provides that a state has a legal obligation to put an end to another state or a non-state actor’s hostile cyber operation that is being mounted from, or that remotely employs cyber infrastructure on, its territory when that operation has serious adverse consequences with respect to a third state’s rights under international law, typically sovereignty. An “injured state” may take cyber countermeasures against cyber or non-cyber wrongful acts by the “responsible state,” and non-cyber countermeasures are equally available to the injured state against the responsible state’s unlawful cyber operations. The Minister’s letter offers an injured state’s cyber operation that shuts down networks or systems that the responsible state is using for a cyber attack as an illustration of a countermeasure.Read More
  • The Connected Cybercrime Ecosystem & the Impact of the Capital One Breach
    It's been about two months since one of the biggest data breaches in history was announced: A hacker gained access to more than 100 million Capital One customers' accounts and credit card applications. The size and severity of the Capital One breach, the type of data that was compromised, and the customers that have been affected (subprime borrowers and small and midsize businesses [SMBs]) are having a significant impact on the increasingly complicated — and connected — cybercrime ecosystem. And now the same data — data used by Capital One to strategically fuel growth, target businesses, and identify which consumers would provide the most long-term value — is exposed on the Dark Web. The grim reality is that in today's digital landscape, it wasn't a matter of if but when we would witness another breach with the impact akin to Equifax in 2017 — where the quality of data exposed paints a frighteningly accurate portrait of one's financial health and where the devastating ripple effects of fraud will be felt by end users even years later.Read More
  • Europol: Bitcoin is the still the dark web’s favorite cryptocurrency
    Bitcoin BTC is still very much the dark web‘s favorite cryptocurrency, but those looking to cover their tracks are slowly learning to use privacy-focused alternatives. “While we have previously reported a small shift towards more privacy-focused cryptocurrencies such as Monero, Bitcoin still remains the currency of choice for both legitimate and criminal use,” reports Europol with its latest assessment of internet-based organised crime. Europol notes that Bitcoin‘s prevalence in the underground economy is a consequence of its familiarity within the customer base, particularly in dark web markets. In particular, ransomware campaigns have continued to feature Bitcoin almost exclusively. Hard Fork has previously reported on numerous ransomware attacks that’ve demanded Bitcoin to restore encrypted files. Still, authorities say there has been a more “pronounced shift” towards more privacy-orientated cryptocurrencies, and expects this trend to continue as criminals become more security aware.Read More
  • Canon partners with McAfee to strengthen businesses endpoint security
    Under the new partnership, McAfee Embedded Control will offer an additional standard security feature on the third edition of Canon image Runner Advance Generation 3 MFDs. Technology firm Canon has announced a strategic partnership with cybersecurity company McAfee to provide businesses with embedded protection against malware execution and tampering of firmware and applications running on multi-function devices (MFDs). Under the new partnership, McAfee Embedded Control will offer an additional standard security feature on the third edition of Canon image Runner Advance Generation 3 MFDs. K. Bhaskhar, vice president, business imaging solutions, Canon India, said “Security is among the top priorities of businesses today as cyber threats continue to develop in sophistication. Our image Runner Advance MFDs are highly secure by design, but with the ever-evolving cyber security landscape, we strive to bring our customers the latest in security and innovation.Read More
  • Equinix Appoints Michael Montoya as Chief Information Security Officer
    REDWOOD CITY, Calif., Oct. 14, 2019 /PRNewswire/ -- Equinix, Inc. (EQIX), the global interconnection and data center company, today announced the appointment of Michael Montoya as Chief Information Security Officer (CISO), further bolstering the company's commitment to security. Michael is a recognized security leader with deep expertise in information security, risk governance, data privacy and technology deployment. At Equinix, security and data privacy are key embedded tenets of our overall technology service delivery, both for our internal employees as well as our customers. Michael is a recognized security leader with deep expertise in information security, risk governance, data privacy and technology deployment. At Equinix, security and data privacy are key embedded tenets of our overall technology service delivery, both for our internal employees as well as our customers.Read More
  • Iranian Hackers Create Credible Phishing to Steal Library Access
    The Silent Librarian threat group is constantly updating its tactics and techniques, to the point of using on its login phishing pages info and alerts that is accurate and relevant to potential victims. Phishing theme is constant In a report today, researchers at cybersecurity company Proofpoint highlight that Silent Librarian's wording in phishing emails has evolved over time. The methods used by this threat actor are far from sophisticated, but the continuation of these campaigns proves that they are efficient for the goal set by Silent Librarian. In a report in September, researchers at SecureWorks said that Silent Librarian impacted at least 380 universities in over 30 countries. "While other actors are more sophisticated in their obfuscation, infrastructure, and methodology, Silent Librarian remains both prolific and effective at compromising new accounts and stealing credentials that can be used for financial gain." - Christopher Dawson, Threat Intelligence Lead, Threat Operations at Proofpoint A typical Silent Librarian attack flow starts with creating a shortened URL using an account from a compromised university.Read More
  • Researchers find Bitcoin sextortion malware also mines Monero
    Reason Cybersecurity researchers dubbed the malware Save Yourself, as recipients typically receive the bogus emails from senders like “SaveYourself@856.com.” The emails state that dangerous malware has infected the recipient’s machine, but Reason found this isn’t the case. Save Yourself cleaners are spreading more malware The firm was clear to point out that receiving the Bitcoin sextortion email doesn’t automatically mean infection, just that the recipient’s email address has been exposed in a password dump. Researchers ironically found, however, that many sites offering products to supposedly remove the Save Yourself malware were actually peddling malware. Sextortion email example courtesy of Reason “It is very possible that the malware author has gathered and combined several viruses and modified them to suit their own needs,” said Reason. To date, analysts found more than 110,000 users have been infected with the Save Yourself malware. Save Yourself can also steal your Bitcoin Reason reported that the malware is designed to remain under the user’s radar.Read More
  • NATO Allies Need to Come to Terms With Offensive Cyber Operations
    My proposed solution: NATO allies should establish memoranda of understanding on offensive cyber effects operations in systems or networks based in allied territory. Allied states may operate in each other’s systems or networks in at least three ways: as an observer, gathering intelligence on adversarial activity in others’ networks; as a passerby, transiting through allied systems and networks to access a certain adversarial target; or as a disrupter, seeking to cause friction for an adversary’s operation within an ally’s network or system. According to the Canadian government, “CSE could be authorized to proactively stop or impede foreign cyber threats before they damage Canadian systems or information holdings, and conduct online operations to advance national objectives.” The Canadian government does not explicitly talk in its latest strategy about the need to operate “globally, continuously and seamlessly” or to cause friction “wherever the adversary maneuvers.” In that regard, it needs to do more strategic thinking—as other countries do—on the exact role of cyber operations on allied networks in the military context.Read More
  • Apple accused of sending data from 1billion iPhones and iPads to china
    Apple has found itself in the middle of another storm in a China teacup, this one relating to the company’s inclusion of a Chinese company’s safe browsing service within its Safari web browser. The issue came to the fore when Reclaim The Net published an article on October 10 which warned that “it’s been discovered that Apple, which often positions itself as a champion of privacy and human rights, is sending some IP addresses from users of its Safari browser on iOS to Chinese conglomerate Tencent—a company with close ties to the Chinese Communist Party.” “It’s unclear when Apple started allowing Tencent and Google to log some user IP addresses,” Reclaim The Net says, “but one Twitter user reported seeing this change to Safari as early as the iOS 12.2 beta in February 2019. But, unsurprisingly, this prompted the usual Apple China backlash, with users taking to the internet to share their intent to turn off safe browsing, such was their concern about the invasion of personal privacy Beijing was about to inflict on them.Read More
  • Mailing services firm Pitney Bowes says it suffered malware attack, shares down
    (Reuters) - Mail management company Pitney Bowes Inc said on Monday a malware attack encrypted information on some of its systems and disrupted customer access to certain services, sending its shares down 4%. The company said it had seen no evidence that customer or employee data has been improperly accessed.Read More