Archive for the ‘Cyber Attack’ Category

These 2 attacks allow to alter certified PDF Documents

Researchers from Ruhr-University Bochum have disclosed two new attack techniques, dubbed Evil Annotation and Sneaky Signature attacks, on certified PDF documents that could potentially allow attackers to modify visible content without invalidating their digital signature. The attacks are documented in  CVE-2020-35931 ,  CVE-2021-28545 , and  CVE-2021-28546 . The experts presented the results of the study at the 42nd […]

Leave a Comment

Hospital Operator Takes Network Offline After Major Cyberattack

A Californian hospital operator has made the move to take is network offline after it was hit by a major cyberattack.  Reports state that the Scripps Health computer network that operates across half a dozen hospitals and a number of outpatient facilities in the San Diego, California area was forced to move to offline procedures […]

Leave a Comment

The cost of a cyber attack in 2021

It’s been rough sailing for organisations in the past year or so. In addition to the ongoing challenges of COVID-19, there are the effects of Brexit, increasing public awareness of privacy rights and regulatory pressure to improve data protection practices. And, of course, there is the threat of cyber attacks. According to a UK government […]

Leave a Comment

Alarming Cybersecurity Stats: What You Need To Know For 2021

The year 2020 broke all records when it came to data lost in breaches and sheer numbers of cyber-attacks on companies, government, and individuals. In addition, the sophistication of threats increased from the application of emerging technologies such as machine learning, artificial intelligence, and 5G,  and especially from greater tactical cooperation among hacker groups and […]

Leave a Comment

How do I select an attack detection solution for my business?

When selecting an attack detection solution, no single product will provide the adequate detection needed that is required to detect and defend against the current advanced threat landscape. The holistic aspect of defending against threat actors requires technology, expertise, and intelligence. The technology should be a platform of integrated technologies providing detection at each point […]

Leave a Comment

Hacking Weapons Systems

The Cyberweapons Arms Race

Leave a Comment

FCC Boots Chinese Telecom Companies, Citing Security

he Federal Communications Commission’s (FCC) Public Safety and Homeland Security Bureau on March 12 identified five Chinese companies they said posed a threat to U.S. national security. These companies are: Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. The declaration, according to the FCC, is in accordance […]

Leave a Comment

How to stay ahead of the rise of synthetic fraud

There are a number of reasons why synthetic fraud is on the rise, but there are also actions banks and other financial institutions can take to prevent this growing trend from doing damage. Synthetic fraud on the rise Banks around the world have faced difficulty in recognizing this type of complex fraud. Synthetic identity fraudsters […]

Leave a Comment

Microsoft releases open-source CodeQL queries to assess Solorigate compromise

Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack In early 2021, the US agencies FBI, CISA, ODNI, and the NSA released a joint statement that blames Russia for the SolarWinds supply chain attack. The four agencies were part of the task force Cyber Unified Coordination Group (UCG) […]

Leave a Comment

Georgetown County has yet to recover from a sophisticated cyber attack

Leave a Comment

How safe is our water supply from cyberattacks?

Our sister station WFLA in Tampa Florida reported earlier this month that a hacker altered the levels of chemicals in the water supply of a Florida city to ‘potentially damaging’ levels. A plant operator at a water treatment facility in Oldsmar, Florida noticed someone had remotely accessed the computer system he was monitoring and increased the sodium […]

Leave a Comment

Experts spotted the first malware tailored for Apple M1 Chip, it is just the beginning

Apple launched its M1 chip and cybercriminals developed a malware sample specifically for it, the latest generation of Macs are their next targets. The popular security researcher Patrick Wardle discovered one of the first malware designed to target latest generation of Apple devices using the company M1 chip. The discovery suggests threat actors are tailoring […]

Leave a Comment

Chinese Supply-Chain Attack on Computer Systems

Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008. The US government has known about it for almost as long, and has tried to keep the attack secret: China’s exploitation of products made by Supermicro, as the U.S. company is […]

Leave a Comment

Attack against Florida Water Treatment Facility

Leave a Comment

SVR Attacks on Microsoft 365

Leave a Comment

Sophisticated Watering Hole Attack

Google’s Project Zero has exposed a sophisticated watering-hole attack targeting both Windows and Android: Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside researchers (both companies have since patched the security flaws). The hackers delivered the exploits through watering-hole attacks, which compromise sites frequented […]

Leave a Comment

FBI: Hackers stole source code from US government agencies and private companies

FBI blames intrusions on improperly configured SonarQube source code management tools. FBI officials say that threat actors have abused these misconfigurations to access SonarQube instances, pivot to the connected source code repositories, and then access and steal proprietary or private/sensitive applications. Officials provided two examples of past incidents: “In August 2020, unknown threat actors leaked […]

Leave a Comment

List of data breaches and cyber attacks in September 2020 – 267 million records breached 

Take a look at the top data breaches and cyber attacks in September, as well as our full list of 102 incidents. Source: List of data breaches and cyber attacks in September 2020 – 267 million records breached – IT Governance UK Blog Data Breaches: Crisis and Opportunity

Leave a Comment

Alleged cyber attacks caused explosions at facilities in Iran

The root cause of a series of explosions at important Iranian facilities may be cyberattacks allegedly launched by Israel. Source: Alleged cyber attacks caused explosions at facilities in Iran Stuxnet 2? Iran Hints Nuclear Site Explosion Could Be A Cyberattack Stuxnet 0.5: The Missing Link How Israel Rules The World Of Cyber Security | VICE […]

Leave a Comment

Digital Downfall: Technology, Cyberattacks and the End of the American Republic

Digital Downfall: Technology, Cyberattacks and the End of the American Republic… Source: Digital Downfall: Technology, Cyberattacks and the End of the American Republic: Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and […]

Leave a Comment