Login

Register

Login

Register

Day

January 22, 2020
Cross-sector report demands changes to outdated cybercrime law A cross-sector lobbying group is calling on the UK to reform its computer crime laws, legislation that its members say has failed to keep up with present demands of increasing connectivity. In a report released today (January 22) by the Criminal Law Reform network (CLRNN), lobbyists said...
Read More
The intelligence in this week’s iteration discuss the following threats: APT40, APT28, data-breach, Trickbot, phishing, targeted attacks, JhoneRAT, Pegasus. The IOCs related to these stories are attached to the Community Threat Briefing and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached...
Read More
It’s not often we get to make an announcement quite this exciting: IntelliGO Networks has been acquired by ActZero, a Palo Alto-based artificial intelligence company! You can check out the press release here. This partnership means incredible things for our clients, partners, and employees! In this blog post, we’ll discuss how the acquisition might impact...
Read More
While doing good for the user is the theoretical ideal, the threat of fiscal repercussions should drive organizations to take privacy seriously. That means security and data privacy teams must work more closely. In the wake of companies such as British Airways, Marriott, and Facebook facing record privacy violation fines, organizations are seeing the ramifications...
Read More
Companies and organisations are being hit by ransomware attacks all the time. And, normally, the impact on current and former customers of the affected firms are more likely to be inconvenienced rather than be put in any direct peril themselves. But the nature of ransomware is changing, as online criminals might seek to not just...
Read More
Dr. Kathleen Kiernan is a 29-year veteran of Federal Law Enforcement, previously serving as the Assistant Director for the Office of Strategic Intelligence and Information for the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) where she was responsible for the design and implementation of an intelligence-led organizational strategy to mine...
Read More
They’re especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords. The Star Wars film franchise has fascinated society with unprecedented fervor for over 40 years, and it’s easy to see why: They’re Shakespearean tales with lightsabers and spaceships. But aside from timeless lessons about love and...
Read More
The smartphone of Amazon founder Jeff Bezos, the world’s richest man, was reportedly hacked in May 2018 after receiving a WhatsApp message from the personal account of Saudi crown prince Mohammed bin Salman, the Guardian newspaper revealed today. Citing unnamed sources familiar with digital forensic analysis of the breach, the newspaper claimed that a massive...
Read More
Microsoft has admitted that between December 5th-31st 2019, a misconfiguration of the security rules for (what should have been) an internal customer support database left it exposed for anyone to access – no password required. According to researcher Bob Diachenko, who discovered the database was accessible to anyone capable of running a web browser, the...
Read More
Samy Bensaci, an 18-year-old living in Montreal, Canada, has been charged in connection with the theft of over $50 million worth of cryptocurrency in a SIM-swapping scam. A SIM swap attack (also sometimes called a Port Out scam) is one where fraudsters manage to trick the customer support staff of cellphone operators into giving them...
Read More
The United Parcel Service (UPS) revealed that a phishing incident might have exposed the information of some of its customers. In its “Notice of Data Breach” letter, UPS disclosed that an unauthorized person had used a phishing attack to gain access to store email accounts at some of its store locations between September 29, 2019...
Read More
“Gates recalled Manafort saying the hack was likely carried out by the Ukrainians, not the Russians, which parroted a narrative Kilimnik often supported,” reads a memo summarizing an April 2018 FBI interview with Gates, who cooperated with federal prosecutors and testified against Manafort in exchange for a more lenient sentence. It’s not clear whether Trump...
Read More
What are the key considerations security decision-makers should take into account when designing their 2020 breach protection? To answer this, we polled 1,536 cybersecurity professionals in The State of Breach Protection 2020 survey (Download the full survey here) to understand the common practices, prioritization, and preferences of the organization today in protecting themselves from breaches....
Read More
Apple dropped plans to offer end-to-end encrypted cloud back-ups to its global customer base after the FBI complained, a new report has claimed. Citing six sources “familiar with the matter,” Reuters claimed that Apple changed its mind over the plans for iCloud two years ago after the Feds argued in private it would seriously hinder...
Read More
Investigators wrapped up their investigation last week into the alleged sales by “Haurus”, the code name for the DGSI officer, now 33, who was arrested in September 2018. His partner and four of his clients, including a private detective, have also been charged in the inquiry. Investigators became suspicious after France’s OCRIEST agency, charged with stopping...
Read More
Organizations are actively working to prevent data breaches by encrypting their sensitive information. Encryption isn’t a foolproof security measure, however. If attackers get control of an organization’s encryption keys, for instance, they can use them to decrypt its data and thereby steal its plaintext contents. Fortunately, organizations can bolster their implementations of encryption by practicing...
Read More
Estimated reading time: 5 minutes Recently while threat hunting, Quick Heal Security Labs came across an unusual Node.js framework based Nodera ransomware. The use of Node.js framework is not seen commonly across malware families. Latest development by threat actors reveal a nasty and one-of-its-kind ransomware being created; one that uses Node.js framework, which enables it to infect Windows...
Read More
Microsoft briefly exposed call center data on almost 250 million customers via several unsecured cloud servers late last year, according to researchers. Bob Diachenko spotted the major privacy snafu a day after databases across five Elasticsearch servers were indexed by the BinaryEdge search engine on December 28. Each contained a seemingly identical trove of Microsoft...
Read More
In one of the most strategic acquisitions in the Asia Pacific (APAC) region, Kroll, a global risk solutions provider based in New York, has acquired a Singapore-headquartered cybersecurity firm, RP Digital Security (RP-DS). This is a strategic move from Kroll’s viewpoint since RP-DS has offices and clientele in Singapore, Hong Kong, and Indonesia. The latest...
Read More
What’s the story?The media is reporting that an investigation has concluded that Jeff Bezos’s smartphone was hacked after receiving a WhatsApp message from Mohammed bin Salman. Jeff Bezos, the billionaire who founded Amazon?That’s the one. He also owns the Washington Post. Mohammed bin Salman, the crown prince of Saudi Arabia?That’s the chap. Also known as...
Read More
1 2 3 4
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW