• WeWork Manhattan workspace WiFi network reportedly exposed sensitive data
    Vulnerabilities in WeWork’s WiFi network have been discovered which expose sensitive data of the companies in the building. This was initially discovered by a tenant who wanted to make sure that his organization’s data was not exposed.Read More
  • Pet retailer shop Animates announces data breach
    The incident occurred between June 29 and September 13, 2019. This may have affected the personal and financial information of customers.Read More
  • Attackers breached Click2Gov payment portals in 8 cities compromising over 20,000 payment card records
    Researchers have observed the second wave of Click2Gov breaches that have hit 8 cities in 5 states, compromising over 20,000 payment card records. The impacted cities include Deerfield Beach, Palm Bay, Milton, and Coral Springs in Florida, Bakersfield in California, Pocatello in Idaho, Broken Arrow in Oklahoma, and Ames in Iowa.Read More
  • Researchers report rapid propagation of Smominru botnet
    The Smominru botnet has been observed to infect nearly 90,000 machines in the past month. This botnet primarily exploits ExternalBlue vulnerability and also performs brute force attacks on MS-SQL, RDP, and Telnet services.Read More
  • Attackers use Single Sign-On in Phishing pages used to steal credentials
    Malicious pages have been reported to leverage Single Sign-On (SSO) to steal users’ credentials. This form of phishing attack has grown with the popularity and ease of SSO among widely used websites.Read More
  • Sensitive Data Including Source Code and Credentials Belonging to Scotiabank Exposed via Github Repositories
    Scotiabank’s source code and other sensitive data such as credentials were found on publicly available GitHub repositories. The Canadian bank has taken down the repositories after being alerted by The Register.Read More
  • IoT devices send user data to third-parties including Netflix, Microsoft, and Google
    56 % of the US IoT devices and 83.8 % of the UK devices are exposing information to third-parties. The most common data shared by IoT devices to third-parties include location data and IP addresses.Read More
  • Ava R-I School District hit with ransomware attack
    Ava uses encrypted data, stores information on off-site servers, and has a good backup system, so the district's financial, employee and student information was not compromised. The school Superintendent Dr. Jason Dial noted that they found some holes in their systems and are fixing them.Read More
  • The Saudi oil attacks could be a precursor to widespread cyberwarfare — with collateral damage for companies in the region
    udi defence ministry spokesman Colonel Turki Al-Malik displays on a screen drones which Saudi government says attacked an Aramco oil facility, during a news conference in Riyadh, Saudi Arabia September 18, 2019.A recent attack against Saudi Aramco damaged the world's largest oil producer and delayed oil production, roiling oil and gas markets. It did this quite successfully, said Brian Hussey, vice president of cyber threat detection and response for cybersecurity company Trustwave."You saw that at Saudi Aramco, 30,000 boxes got bricked," said Hussey, describing how 30,000 of the oil agency's computers were erased over the course of the day, destroying swaths of data.The attack laid out Iran's cyber capabilities for the world to see, but had little financial impact on Saudi Aramco, costing only a small fraction of the oil giant's daily revenue, Applegate said."While they made a big impact on the world stage, they did not bleed over into the wider system.Read More
  • Idaho Students Get Clean Computers Month After Cyberattack
    NAMPA, Idaho (AP) — An Idaho school district has distributed computers to students a month after a department-wide cyberattack wiped out the district's network, officials said. Nampa School District officials finished giving out re-imaged laptops to middle school students after high school students were equipped with unaffected devices last week, The Idaho Press reported Thursday. The cyberattack on Aug. 21 came just two days after the school year began, disabling the district's entire computer network. With more than 14,000 students, the Nampa School District is one of the largest in the state. "Our top priority is to get everything back up and running," district spokeswoman Kathleen Tuck said. Tuck responded to him with everything the district knows, but she said the district doesn't know what happened yet.Read More
  • Google Says It's Achieved Quantum Supremacy, a World-First: Report
    BristleconePhoto: Google AI BlogA Google researcher’s paper claiming to have achieved quantum supremacy, a major early milestone in the field of quantum computing, appeared on a NASA website this week before being removed, the Financial Times reports.Google, as well as IBM, Microsoft, Intel, and other large tech companies and startups, have been working to build quantum computers, a new kind of computer based on an entirely different architecture than classical computers. Though this announcement is not official, scientists and industry experts have long expected Google to build a quantum computer capable of reaching this milestone—a quantum computer performing a calculation that a classical computer can’t.You can read our primer on quantum computers here and our primer on quantum supremacy here.Read More
  • Cybersecurity facing growing threats by unknown forces like NK: defense minister
    Defense Minister Jeong Kyeong-doo leaves the National Assembly after attending a seminar, Monday. YonhapBy Park Ji-wonCybersecurity threats are growing following continuing attacks from unknown groups including one linked to North Korea, Defense Minister Jeong Kyeong-doo said Friday."Cybersecurity threats are growing in cyberspace across the globe as attacks by North Korea and other unspecified forces continue," Jeong said in a welcoming speech during a conference on military cybersecurity in Seoul.Citing the fact that the U.S. has added three groups of hackers allegedly working for North Korea to its sanctions list, he said: "Those are known to be involved in the hacking of Sony Pictures in 2014, the WannaCry ransomware attack in 2017 and foreign financial institutions."His remarks came after the U.S. Treasury announced sanctions on Sept. 13 on Lazarus Group, Bluenoroff, and Andariel, the three North Korean hacker groups which allegedly conducted ransomware attacks and cyberattacks on international banks and customer information.Read More
  • Indonesia, Malaysia Probe Lion Air Customer Data Leak
    Authorities are probing a customer data leak at Lion Air, Indonesia's communications ministry said Friday, in a breach that reportedly affected millions of the carrier's customers. Two of the airline's subsidiaries, Malaysia-based Malindo Air and Thai Lion Air, acknowledged passenger data may have been stolen from remote servers operated by Amazon. "Thai Lion Air has come to be aware that some personal data concerning our passengers hosted on a cloud-based environment may have been compromised," it said in a statement. Lion Air -- Southeast Asia's biggest airline by fleet size -- said it was cooperating with an Indonesian-Malaysian investigation into the apparent hack, which also affected Lion units Batik Air and Wings Air. Lion did not reveal how many customers were affected, but said their payment information was not stored on the affected servers. Amazon Web Services, which operates servers that stored the breached data, declined to comment.Read More
  • Meet Stop Ransomware: The Most Active Ransomware Nobody Talks About
    Yet, based on Michael Gillespie's ID Ransomware submissions and support requests at BleepingComputer, for the past year it has been the most actively distributed ransomware in the wild. To give you some perspective, the ransomware identification service ID Ransomware gets approximately 2,500 ransomware submissions a day. September STOP Ransomware submissions This amount of submissions beats out any other ransomware that users are submitting to the service when trying to get help. STOP Ransomware submissions over a year STOP is getting so big that the image above looks like Pacman eating all of the other ransomware! Cracks, Adware bundles, and shady sites In order to distribute STOP, the ransomware developers have teamed up with shady sites and adware bundles. It is not only cracks, though, as many of these shady sites offer downloads of free software, but are simply just adware bundles that install the ransomware.Read More
  • Did the ATO send you a ‘Payment Update’ email? It's not real
    “The recipient’s email address is visible in the ‘TO header’ at the top of the email, as well as in the bottom of the email in the ‘unsubscribe’ line.” (Source: MailGuard) More (Source: MailGuard) More (Source: MailGuard) More (Source: MailGuard) More MailGuard urges all recipients of this email not to open any attachments or click on any links.”Read More
  • Davenport University Gets $4M Cybersecurity Training Grant
    (TNS) — Michigan's Davenport University received a five-year, $4 million grant from the National Science Foundation (NSF) to train and educate cybersecurity experts as part of its CyberCorps Scholarship for Service program, officials announced Thursday, Sept. 19. Since 2011, Davenport University has been designated as a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the Department of Homeland Security. “This grant validates the quality education Davenport University provides and the confidence the federal government has in our ability to deliver the talent needed to address one of our nation’s most pressing issues in cybersecurity.” Pink said the college is proud to be a partner with Davenport, the National Science Foundation and its local high schools to inspire the students of the future. As part of the program, participating students mentor local high school students looking to pursue a career in cybersecurity.Read More
  • Sen. Warner Raises Concerns Over Cybersecurity Practices Leading to Data Breaches
    By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.Read More
  • Forcepoint VPN Client is Vulnerable to Privilege Escalation Attacks
    Forcepoint has fixed a privilege escalation vulnerability in its VPN Client for Windows. A vulnerability has been discovered in the Forcepoint VPN Client software for Windows. “This vulnerability could have been exploited by an attacker during a post-exploitation phase in order to achieve privilege escalation, persistence and in some cases defense evasion by using the technique of implanting an arbitrary unsigned executable which is executed by a signed service that runs as NT AUTHORITY\SYSTEM [the user account with the highest level of privileges],” researchers with SafeBreach said in a Friday analysis. So if an unauthorized user, with preexisting access to the system, planted an executable file in one of those two locations, the VPN Client would execute either, giving the user or attacker the highest level of privileges on the targeted end point.Read More