Login

Register

Login

Register

Category

Computer Hacking

Find the latest, breaking news stories on computer hacking as it breaks.

With COVID-19 concerns running high, attackers are trying new tactics to get to users. Scammers can be pretty innovative when it comes to finding new ways to sneak phishing messages past secure email gateways and other filtering mechanisms. One example is “text direction deception,” a tactic where an attacker forces an HTML rendering engine to...
Read More
As organizations rush to equip and secure their newly remote workforce, it’s important to keep things methodical and purposeful Faced with the certainty of organizational and global impact, and trying to urgently be a good corporate citizen, of course your organization is sending staff home. And while HR and finance are struggling with how to...
Read More
Bold new thinking is needed to solve the rapidly evolving challenge of third-party risk management. Just five years ago, many companies focused their cyber defense efforts almost entirely on their own organizations. Today, they are increasingly concerned about third-party risks, with good reason. According to Ponemon Institute’s “US Cost of a Data Breach Study,”...
Read More
MakeFrame, named for its ability to make iframes for skimming payment data, is attributed to Magecart Group 7. A new Magecart skimmer, dubbed MakeFrame, has been observed compromising 19 victim websites. The skimmer was named for its ability to make iframes for skimming payment data. RiskIQ researchers became aware of the new skimmer on Jan....
Read More
Technique involves saving malicious Excel file as “read-only” and tricking users into opening it, Mimecast says. Researchers from Mimecast have recently observed a campaign where threat actors are using a somewhat rarely seen but easy method to distribute malware using Microsoft Excel’s standard file encryption capabilities. The tactic essentially involves a threat actor hiding malicious...
Read More
It’s not just the IT and security team’s responsibility to keep data safe — every member of the team needs to be involved. A recent lawsuit filed regarding the infamous 2017 Equifax data breach revealed that the company was using “admin” as a username and password to protect sensitive data from 147 million customers —...
Read More
Microsoft has notified dozens of hospitals with vulnerable gateway and VPN appliances in their infrastructure, which could put them at risk. Microsoft is alerting healthcare organizations to a rise in human-operated ransomware, which has been growing in frequency as attackers continue to take advantage of the COVID-19 crisis. These types of ransomware campaigns typically seek...
Read More
Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year. Discovery and defense evasion were the predominant attacker tactics observed in 2019, a team of researchers report in a new ranking of common MITRE ATT&CK tactics used in the past year. In 2019, Recorded Future’s Insikt Group...
Read More
Holy Water campaign is targeting users of a specific religious and ethnic group in Asia, Kaspersky says. A new malware distribution campaign targeted at users in Asian countries is the latest reminder of why attacks don’t always have to be sophisticated to be effective. The campaign involves the use of watering-hole websites to drop malware...
Read More
Given today’s coronavirus pandemic, the need for companies to collect cybersecurity data about their business partners is more critical than ever. Here’s how to start. Over recent weeks, the ongoing spread of the COVID-19 coronavirus has forced companies around the country to make difficult decisions about how to protect their employees — as well as...
Read More
The data was breached through the credentials of two franchisee employees. Marriott International has notified some 5.2 million guests that their personal information could have been accessed in the breach of an internal application used to help provide guest services. According to the company, the breach was active from mid-January until the end of February...
Read More
Why every business needs cyber resilience and quick recovery times. Cyber incidents in the past few years have captured the attention of business executives. The World Economic Forum’s “Global Risks Report 2020” cites cyberattacks among today’s top 10 business risks in terms of their likelihood of occurring and ability to inflict catastrophic damage. According to...
Read More
Attackers work 24/7, so you have to be vigilant around the clock. Time for some game theory. Organizations will be quickly overwhelmed if they try to treat all vulnerabilities equally. Given the sheer volume of vulnerabilities, limited resources, and varying objectives across the teams involved, effective cybersecurity requires the ability to view vulnerabilities in the...
Read More
Gone are the days when threat actors had to actually spend time and effort planning and developing an attack on their own, Recorded Future says. Just as security automation is helping organizations more effectively detect, respond to, and remediate cyberthreats, it is making life easier for cybercriminals as well. Recorded Future recently analyzed data from...
Read More
As pandemic worsens, online profiteering — from fraudsters to ransomware operators to cybercriminal hacking — continues unabated, despite some promises from the underground. Pandemics make for strange bedfellows. In mid-March, ransomware gangs claimed to be pausing operations against healthcare organizations for the duration of the coronavirus pandemic, following pleas from some security firms and questions...
Read More
The new malware, dubbed “Milum,” can take control of industrial devices. A Trojan that gains remote control of devices has been identified and is being tracked by researchers with the Kaspersky Global Research and Analysis Team (GReAT). Dubbed “Milum,” the Trojan is being distributed in a campaign the researchers are calling “WildPressure.” Analysis indicates that...
Read More
Researchers warn Microsoft 365 account holders to pay attention to unknown applications that request permissions. Microsoft Azure applications could be weaponized to break into Microsoft 365 accounts, report researchers who are investigating new attack vectors as businesses transition to cloud environments. The Varonis research team encountered this vector while exploring different ways to exploit Azure,...
Read More
In today’s regulatory and legislative environment, companies and individuals are exposed to lawsuits over security breaches, resulting in significant fines and ending careers. To err is human, and developers writing code err as often as any other humans. The industry average for programmers, in fact, is as many as 70 errors per 1,000 lines of code....
Read More
The motives behind the attacks remain unclear, but likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic. APT41, a prolific advanced persistent threat group believed to be working on behalf of the Chinese government, has sharply ramped up its activities in recent months after a relative lull....
Read More
Goal is to help organizations – especially healthcare entities – protect against cybercriminals trying to take advantage of the pandemic. [This article was updated at 10:15 a.m. EDT with additional comments from founding member Marc Rogers] A group of cybersecurity experts from around the world — including from companies like Microsoft and Okta — have...
Read More
1 2 3 10
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW