Login

Register

Login

Register

Tag

blackhat
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, Data Leak, Mobile Malware, Parallax, TrickBot, and Vulnerabilities. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity. Figure 1 – IOC...
Read More
A cybersecurity company has launched a lockdown-friendly hacking competition that doesn’t require any travel or socializing.  Participants of Cyber 2.0’s new Home Hackers Challenge can compete for a cash prize without having to leave their houses.  The competition is open to every hacker in the world, and the premise is simple—the first competitor to break into a...
Read More
An American healthcare provider whose patients’ records were allegedly published online in a ransomware attack has told patients their data is secure. Affordacare runs an urgent care walk-in clinic network out of five locations in Texas. The organization was hit by a ransomware attack in February. In a breach notification published on the organization’s website, Affordacare wrote: “Hackers...
Read More
“Do you know how to buy spliff on Tor?” My pal Ben is not the only one asking where to buy drugs on the so-called dark web. On London’s empty streets, there are whispers about drug dealers shutting up shop, refusing to sell to anyone except their best customers; concerned about their next reload. Like...
Read More
Al Alper is an optimistic man, and someone who believes that “we all do well by doing good.” And he’s used to figuring out how to solve problems. The career path that led him from being a teacher to the owner of two IT and security related firms (Absolute Logic and CyberGuard 360) has taught...
Read More
More ransomware victims than ever before are complying with the demands of their cyber-attackers by handing over cash to retrieve encrypted files.  New research published March 31 by CyberEdge shows that both the number of ransomware attacks and the percentage of attacks that result in payment have increased every year since 2017. The CyberEdge 2020 Cyberthreat...
Read More
The IcedID banking Trojan was discovered by IBM X-Force researchers in 2017. At that time, it targeted banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites, mainly in the U.S. IcedID has since continued to evolve, and while one of its more recent versions became active in late-2019, X-Force researchers have identified...
Read More
Prime Minister Sanna Marin speaks during a press conference on March 16. Antti Aimo-Koivisto/Lehtikuva/AFP via Getty Images Finnish Prime Minister Sanna Marin has admitted some aspects of the coronavirus management have not gone perfectly in her country, according to the Finnish public broadcaster YLE. At a press conference on Wednesday, Prime Minister Sanna Marin admitted...
Read More
UK businesses could be putting customer data at risk by having a low understanding of important data protection legislation. Research from IONOS has shown that 44% of IT decision makers in the UK do not have a comprehensive understanding of the US CLOUD Act. In contrast, 92% had a comprehensive understanding of the EU’s General Data Protection...
Read More
Chinese conspiracy theories that COVID-19 was some kind of US military bioweapon date back to January, months before a foreign ministry official in Beijing began to spread the same fake news, according to a new study. An analysis from the Stanford University Cyber Policy Center has revealed how fringe conspiracy theories can eventually become weaponized...
Read More
There’s not many things more annoying then trying to log onto one of your online accounts and realising that you’ve forgotten the password. Especially when most of us only have a few passwords that we just rotate – which makes hackers’ lives easier.  Thankfully, getting one of the best password managers is a straightforward way...
Read More
Online threats have risen by as much as six-times their usual levels over the past four weeks as the COVID-19 pandemic provides new ballast for cyber-attacks, according to Cloudflare. The web security and content delivery vendor analyzed UK traffic figures for the past four weeks compared to the previous month and noted a sharp uptick...
Read More
A new partnership has been announced between the National Cyber Security Centre (NCSC) and the IASME Consortium to relaunch the Cyber Essentials Scheme, with IASME as the sole certification body. The NCSC has carried out research, determining the path to certification for Cyber Essentials could be made clearer, that the standard was being implemented consistently...
Read More
A company claiming to provide “the world’s most secure online backup” leaked metadata and customer information in over 135 million records after misconfiguring an online database, Infosecurity has learned. The team at vpnMentor discovered the privacy snafu as part of its ongoing web mapping project that has already uncovered major cloud data leaks at brands...
Read More
Defence SENATOR THE HON LINDA REYNOLDS CSC Minister for Defence Senator for Western Australia ENROLMENTS OPEN FOR NEW ADF CYBER GAP PROGRAM Enrolments are now open for the Australian Defence Force (ADF) Cyber Gap Program, which will provide funding and work experience for students studying a cyber qualification. From July, a pilot program will operate...
Read More
Dear readers,  The wool has been pulled over society’s eyes for too long, and we’ve had enough of it. The truth is out there, and you deserve to know what it is. That’s why we changed our name to The Wake Up Slap. The revolution has begun. In this modern age of misinformation, disinformation and...
Read More
By Sam Wong , Adam Vaughan , Conrad Quilty-Harper and Layal Liverpool British Airways planes parked up in a row at Gatwick airport.Mike Hewitt/Getty Images Latest coronavirus news as of 5PM on 31 March Planes grounded as flight demand continues to fall British Airways will suspend all flights to and from London’s Gatwick airport. The...
Read More
Welcome to Hillicon Valley, The Hill’s newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley. If you don’t already, be sure to sign up for our newsletter with this LINK. Welcome! Follow our cyber reporter, Maggie Miller (@magmill95), and tech reporter, Chris Mills Rodrigo (@chrisismills),...
Read More
National & World Click here for updates on this story     BOSTON, MA (WCVB) — The FBI in Boston is warning about online classroom and teleconferencing hijacking after two Massachusetts schools were targeted. Officials said reports of so-called Zoom-bombing are emerging nationwide as people turn to video conferencing platforms in the wake of the COVID-19 crisis....
Read More
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT Groups, Data Breach, Mobile Malware, Router Vulnerabilities, Remote Access Trojans, and Vulnerabilities. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity....
Read More
1 2 3 4 79
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW