• Cisco patches serious security flaws found in Prime Infrastructure
    Cisco patched serious security flaws found in Prime Infrastructure. The flaws affect the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager. While two of the flaws required an attacker to have credentials for an attack, the third one could be exploited by an unauthenticated attacker who has the network access.Read More
  • Cybercriminals break into production systems of Stack Overflow
    Cybercriminals break into production systems of Stack Overflow. Stack Overflow mentioned that the attackers gained access to production systems on May 11. However, it says that no customer or user data was breached due to the incident.Read More
  • Unprotected database exposes the personal information of almost 8 million people in the US
    Unprotected database exposes the personal information of almost 8 million people in the US. The leaky database has exposed the personal information of almost 8 million people who had participated in online surveys, contests, and requests for free product samples. The exposed information includes names, addresses, email addresses, phone numbers, dates of birth, gender, and IP addresses.Read More
  • C2 server spills details on activities by Chinese APT groups
    C2 server spills details on activities by Chinese APT groups. The server revealed tools and techniques used by various cyberattack groups based in China. Details from new report also show that certain communication networks were compromised by the groups, which exposed diplomatic cables.Read More
  • Multiple Russian government sites leak passport and personal data of over 2.25 million citizens
    Later, Begtin shared his findings with Russian news site RBC, which published an in-depth article. RBC conducted an investigation and found out that the passport and personal details also belonged to several high-profile Russian government officials including the deputy chairman of the Russian Duma (Parliament) Alexander Zhukov, former deputy prime minister Arkady Dvorkovich, and former deputy prime minister Anatoly Chubais.Read More
  • ARIN uncovers over 757,760 IPv4 addresses obtained through a fraud scheme
    “Fraud will not be tolerated. The vast majority of organizations obtain their address space from ARIN in good faith according to the policies set out by the community. However, ARIN detected fraud as a result of internal due diligence processes, and took action to respond in this particularly egregious case,” Curran said.Read More
  • Bluetooth-enabled Titan security keys found with a serious security hole, Google offers free replacement
    Google is issuing free replacements for Bluetooth Titan security keys. Users are advised to avail them as soon as possible. However, the tech giant suggested using these keys until users get the replacement.Read More
  • Medicare details of Australians available for sale in the darknet
    In a statement, Catherine King, a spokesperson for Labor’s health, criticized the Liberals for not taking effective action against the breach. “[Liberals] told us they’d dealt with this breach. But now we once again have criminals selling Medicare information online. It’s yet another reminder of their shocking record on privacy and cyber security … Australians simply cannot trust them to get this right.”Read More
  • More than 20,000 Linksys routers leak historic record of every device ever connected
    This post has been updated to add comments Linksys made online, which says company researchers couldn't reproduce the information disclosure exploit on routers that installed a patch released in 2014. More than 20,000 Linksys wireless routers are regularly leaking full historic records of every device that has ever connected to them, including devices' unique identifiers, names, and the operating systems they use. Besides handing out device information, vulnerable routers also leak whether their default administrative passwords have been changed. In a statement published Tuesday, one day after Mursch's post went live, Linksys representatives wrote: Linksys responded to a vulnerability submission from Bad Packets on May 7th, 2019 regarding a potential sensitive information disclosure flaw: CVE-2014-8244 (which was fixed in 2014). We quickly tested the router models flagged by Bad Packets using the latest publicly available firmware (with default settings) and have not been able to reproduce CVE-2014-8244; meaning that it is not possible for a remote attacker to retrieve sensitive information via this technique.Read More
  • Faulty database script brings Salesforce to its knees
    Salesforce customers in Europe and North America were the most impacted by the company shutting down access to its own service. Salesforce said the script only impacted customers of Salesforce Pardot -- a business-to-business (B2B) marketing-focused CRM. However, out of an abundance of caution, the company decided to take down all other Salesforce services, for both current and former Pardot customers. Parker Harris, Salesforce CTO and co-founder, apologized for his company's issue on Twitter. To all of our @salesforce customers, please be aware that we are experiencing a major issue with our service and apologize for the impact it is having on you. Salesforce said it was slowly unblocking access for companies that were not impacted by the database script directly.Read More
  • Hackers that stole hundreds of millions of pesos taken down in Guanajuato
    Vehicles seized from hackers, clockwise from top left, values in US dollars: McLaren 720S, $390,000; Aston Martin Vantage, $220,000; Lamborghini Urus, $296,000; Ferrari488 Pista, $335,000. This page is available to subscribers. Click here to sign in or get access.It looks like you are opening this page from the Facebook App. This article needs to be opened in the browser.iOS: Tap the three dots in the top right, then tap on "Open in Safari". Android: Tap the Settings icon (it looks like three horizontal lines), then tap App Settings, then toggle the "Open links externally" setting to On (it should turn from gray to blue).Read More
  • The FBI Found These Cybercriminals Because They Were Advertising Their Skills Online
    In 2016, the GozNym malware was used to steal bank account credentials and, subsequently, money from those accounts. So when people whose computers were infected with GozNym tried to log in to accounts protected with two-factor, the fake banking sites would prompt them to enter a one-time code provided by their token (or other second factor). And when they typed the one-time code into the fraudulent token panel (which they believed was actually their bank’s way of asking them for their second factor), the thieves were then able to intercept that code and use it to log in to the victim’s bank account before the code expired. Once they had compromised the accounts, the perpetrators then tried to make transfers from the victims’ accounts into their own bank accounts.Read More
  • Infamous Forum For Instagram Hackers Gets Hacked by Other Hackers
    A forum where hackers and cybercriminals trade stolen Instagram and Twitter accounts was apparently hacked. The administrator of the forum, which is called OGUSERS, announced it in a post on the forum itself on Thursday. OGUSERS, also known as OGU within its members, is a forum ostensibly launched to trade “OG” usernames, as in: unique, short, and rare usernames. The forum became a hotbed for hackers who specialized in breaking into other people’s accounts, taking control of them, and then selling them to the highest bidder, as a Motherboard investigation revealed last year. Several members of OGUSERS used a technique called SIM swapping to hijack people’s phone numbers. “It's like a nuke dropped on the site,” a OGUSERS member told Motherboard, explaining that people are quitting the site, worried that authorities have their data, or that others will now hack their accounts.Read More
  • Government leaders worry about GPS spoofing, hacking
    Industry leaders and government officials warn position, navigation and timing services are increasingly under attack, including through a method that allows adversaries to manipulate computers that use GPS. During a panel at the annual Satellite conference May 7, industry leaders and government officials pointed to various threats facing GPS and what needs to be done to protect those services. As GPS has become essentially ubiquitous in modern technology, from satellites to personal cell phones, the danger of such an attack has grown and become a greater concern for military leaders. The panelists called for new technology to be made more robust through various authentication methods that can verify the data provided by GPS. Several technologies exist to validate GPS data. Beyond authentication, manufacturers need to ensure that the receivers they build maintain a minimum level of security that can guard against some threats, argued James Platt, director of the PNT office at the Department of Homeland Security.Read More
  • How safe is your blockchain?
    The Jaroona Security Node uses artificial intelligence algorithms and neural networks for self-improving security features that protect the blockchain from cyber attacks The use of consensus models enables the securing of only blockchain ledger immutability against predefined adversarial conditions, but not the securing of smart contracts that are running on it, or of blockchain’s underlying technology. Smart contracts can contain security vulnerabilities, bugs and malware that affect not only a party that places a smart contract into a blockchain, but also blockchain performance itself. The blockchain underlying technology is also prone to software security exploits that open doors to cyber attacks against blockchain and smart contracts.Read More
  • WhatsApp hack: Indian government calls it an issue of 'national cybersecurity'
    WhatsApp, the mobile messaging app, whats recently hit by spyware that was being spread through WhatsApp calling. The Indian government wants to WhatsApp to clarify what it has does to address the situation because the spyware attack and other vulnerabilities like it are an issue of 'national cybersecurity ' This (the spyware attack) stokes the larger issue of national cybersecurity and how to regulate this sphere. WhatsApp, Facebook’s popular messaging mobile app, was recently hit by spyware that could spread with a single phone call.The company says that only a ‘relatively small amount of people’ were affected by hack, globally. But, Indian users who form the WhatsApp’s largest user base accounting for 200 million of its 1.5 billion users — and the Indian government wants answers.Government officials who spoke to ETtech believe that this hack is no mere one-time incident, but it entails a larger issue of cybersecurity .Read More
  • 45% of SA firms are targeted by cyber attacks - report
    DURBAN - The report released by the Ombudsman for Banking Services revealing that 50 percent of all complaints are fraud-related, reinforces the importance of improved cyber awareness.  Banks run extensive education and awareness campaigns and implement numerous security measures to protect their clients.  But consumers are still being tricked by sophisticated cybercriminals who continue to find new and advanced techniques to gather sensitive personal information which they use to bypass banks’ security measures. The latest research from Mimecast and Vanson Bourne found that 45 percent of South African firms reported an increase in targeted spear-fishing attacks using malicious links or attachments over the past year.Read More
  • 4 Lessons to be learned from the DOE’s DDoS attack
    DDoS attacks should be taken seriously Today’s DoS and DDoS attacks are different seeing as they are more vicious, pointed, and capable. For utility providers this kind of attack could prove disastrous to operations, inundating network servers and equipment with requests and blocking out official communications. DDoS attacks should be taken more seriously, and today’s enterprise world should be focused on preventing and protecting from them as much as any other threat. Network layer attacks can last longer than 48 hours, while application layer attacks can go on for days. These attacks can last for increasingly long periods of time, and when it comes to utility providers and the smart grid, that could potentially mean lengthy service disruptions. It’s that all threats should be taken seriously, including DDoS attacks, which are growing more common.Read More