Archive for the ‘Cyber Attack’ Category

How do I select an attack detection solution for my business?

When selecting an attack detection solution, no single product will provide the adequate detection needed that is required to detect and defend against the current advanced threat landscape. The holistic aspect of defending against threat actors requires technology, expertise, and intelligence. The technology should be a platform of integrated technologies providing detection at each point […]

Leave a Comment

Hacking Weapons Systems

The Cyberweapons Arms Race

Leave a Comment

FCC Boots Chinese Telecom Companies, Citing Security

he Federal Communications Commission’s (FCC) Public Safety and Homeland Security Bureau on March 12 identified five Chinese companies they said posed a threat to U.S. national security. These companies are: Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. The declaration, according to the FCC, is in accordance […]

Leave a Comment

How to stay ahead of the rise of synthetic fraud

There are a number of reasons why synthetic fraud is on the rise, but there are also actions banks and other financial institutions can take to prevent this growing trend from doing damage. Synthetic fraud on the rise Banks around the world have faced difficulty in recognizing this type of complex fraud. Synthetic identity fraudsters […]

Leave a Comment

Microsoft releases open-source CodeQL queries to assess Solorigate compromise

Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack In early 2021, the US agencies FBI, CISA, ODNI, and the NSA released a joint statement that blames Russia for the SolarWinds supply chain attack. The four agencies were part of the task force Cyber Unified Coordination Group (UCG) […]

Leave a Comment

Georgetown County has yet to recover from a sophisticated cyber attack

Leave a Comment

How safe is our water supply from cyberattacks?

Our sister station WFLA in Tampa Florida reported earlier this month that a hacker altered the levels of chemicals in the water supply of a Florida city to ‘potentially damaging’ levels. A plant operator at a water treatment facility in Oldsmar, Florida noticed someone had remotely accessed the computer system he was monitoring and increased the sodium […]

Leave a Comment

Experts spotted the first malware tailored for Apple M1 Chip, it is just the beginning

Apple launched its M1 chip and cybercriminals developed a malware sample specifically for it, the latest generation of Macs are their next targets. The popular security researcher Patrick Wardle discovered one of the first malware designed to target latest generation of Apple devices using the company M1 chip. The discovery suggests threat actors are tailoring […]

Leave a Comment

Chinese Supply-Chain Attack on Computer Systems

Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008. The US government has known about it for almost as long, and has tried to keep the attack secret: China’s exploitation of products made by Supermicro, as the U.S. company is […]

Leave a Comment

Attack against Florida Water Treatment Facility

Leave a Comment

SVR Attacks on Microsoft 365

Leave a Comment

Sophisticated Watering Hole Attack

Google’s Project Zero has exposed a sophisticated watering-hole attack targeting both Windows and Android: Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside researchers (both companies have since patched the security flaws). The hackers delivered the exploits through watering-hole attacks, which compromise sites frequented […]

Leave a Comment

FBI: Hackers stole source code from US government agencies and private companies

FBI blames intrusions on improperly configured SonarQube source code management tools. FBI officials say that threat actors have abused these misconfigurations to access SonarQube instances, pivot to the connected source code repositories, and then access and steal proprietary or private/sensitive applications. Officials provided two examples of past incidents: “In August 2020, unknown threat actors leaked […]

Leave a Comment

List of data breaches and cyber attacks in September 2020 – 267 million records breached 

Take a look at the top data breaches and cyber attacks in September, as well as our full list of 102 incidents. Source: List of data breaches and cyber attacks in September 2020 – 267 million records breached – IT Governance UK Blog Data Breaches: Crisis and Opportunity

Leave a Comment

Alleged cyber attacks caused explosions at facilities in Iran

The root cause of a series of explosions at important Iranian facilities may be cyberattacks allegedly launched by Israel. Source: Alleged cyber attacks caused explosions at facilities in Iran Stuxnet 2? Iran Hints Nuclear Site Explosion Could Be A Cyberattack Stuxnet 0.5: The Missing Link How Israel Rules The World Of Cyber Security | VICE […]

Leave a Comment

Digital Downfall: Technology, Cyberattacks and the End of the American Republic

Digital Downfall: Technology, Cyberattacks and the End of the American Republic… Source: Digital Downfall: Technology, Cyberattacks and the End of the American Republic: Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and […]

Leave a Comment

Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found

The publication of ‘Vault 7’ cyber tools by WikiLeaks marked the largest data loss in agency history, a task force concluded. The theft of top-secret computer hacking tools from the CIA in 2016 was the result of a workplace culture in which the agency’s elite computer hackers “prioritized building cyber weapons at the expense of […]

Leave a Comment

OpenSSH introduces a security feature to prevent Side-Channel Attacks

OpenSSH introduces a new feature to prevent Side-Channel attacks, latest release encrypts secret keys in memory as temporary solution. Source: OpenSSH introduces a security feature to prevent Side-Channel Attacks Enter your email address: Delivered by FeedBurner

Leave a Comment

Flipboard says hackers stole user details | ZDNet

Extent of the hack is unknown, but Flipboard said hackers had access to its systems for almost nine months. Source: Flipboard says hackers stole user details | ZDNet Flipboard confirms database hack, resets all user passwords InfoSec Breaches  Subscribe in a reader

Leave a Comment

Uncovering Linux based cyberattack using Azure Security Center

Azure Security Center, Microsoft’s cloud-based cyber solution helps customers safeguard their cloud workloads as well as protect them from these threats. Source: Uncovering Linux based cyberattack using Azure Security Center  Subscribe in a reader

Leave a Comment