"CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency"

"CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency"

The Cybersecurity and Infrastructure Security Agency (CISA) works with public safety, national security, and emergency preparedness communities to improve seamless and secure communications in order to maintain the safety, security, and resiliency of the US. Any disruption to communications can have a domino effect on a public safety agency's ability to provide critical lifesaving services.

Submitted by Gregory Rigby on

"D-Link Says Hacker Exaggerated Data Breach Claims"

"D-Link Says Hacker Exaggerated Data Breach Claims"

D-Link has recently launched an investigation after a hacker offered to sell information allegedly stolen from one of its networks and has determined that the claims are exaggerated.  On October 1, a user of the new BreachForums cybercrime website claimed they had breached the internal network of D-Link in Taiwan, which gave them access to a database storing the information of 3 million customers, as well as source code for the D-View network monitoring product.

Submitted by Adam Ekwall on

"Lloyd's of London Finds Hypothetical Cyberattack Could Cost World Economy $3.5 Trillion"

"Lloyd's of London Finds Hypothetical Cyberattack Could Cost World Economy $3.5 Trillion"

The insurance giant Lloyd's of London has warned that a major cyberattack against payment systems could cost the global economy $3.5 trillion. Modeled by the insurance marketplace and the Cambridge Centre for Risk Studies, the hypothetical scenario is deemed unlikely. Researchers estimated a 3.3 percent chance of happening. In addition, the British government has researched the probability of a cyberattack on the financial system and determined that a catastrophic incident is unlikely.

Submitted by Gregory Rigby on

"FBI Warns of Extortion Groups Targeting Plastic Surgery Offices"

"FBI Warns of Extortion Groups Targeting Plastic Surgery Offices"

According to the FBI, cybercriminals are using spoofed emails and phone numbers to target plastic surgery offices across the US. After gaining access to their networks, the attackers steal data from compromised systems to extort surgeons and patients. Stolen documents may contain highly sensitive information, such as medical records and, in some instances, photos taken for medical purposes. The cybercriminals supplement the stolen data with open-source information, such as social media details, to strengthen their extortion attempts.

Submitted by Gregory Rigby on

"Jupyter Notebooks Targeted by Cryptojackers"

"Jupyter Notebooks Targeted by Cryptojackers"

Researchers have discovered that cryptojackers are targeting exposed Jupyter Notebooks to install cryptocurrency miners and steal credential files for popular cloud services. Jupyter is a service that enables users to host individual code snippets and lets others execute this code in an isolated environment. According to Matt Muir, Threat Research Lead at Cado Security, a Jupyter Notebook refers to an instance of the Jupyter web application where a user would define the code to be run and how it is presented.

Submitted by Gregory Rigby on

"Former Navy IT Manager Sentenced to Prison for Hacking, Selling PII"

"Former Navy IT Manager Sentenced to Prison for Hacking, Selling PII"

A former US Navy IT manager was recently sentenced to five years and five months in prison for hacking into a database, stealing personally identifiable information (PII), and selling it on the dark web.  The man, Marquis Hooper, 32, of Selma, California, who was a chief petty officer, opened under false pretenses an account at a private company operating a database containing the PII of millions of individuals.

Submitted by Adam Ekwall on

"Cybercriminals Register .AI Domains of Trusted Brands for Malicious Activity"

"Cybercriminals Register .AI Domains of Trusted Brands for Malicious Activity"

According to CSC's 2023 Domain Security Report, nearly half of Forbes Global 2000 companies do not have control over their branded Artificial Intelligence (.AI) domain names, which third parties register. Cybercriminals are exploiting the popularity of AI by registering the domains of trusted brands for malicious activity. There has been a 350 percent increase in domain dispute cases involving .AI extensions in 2023 from companies who discovered that third parties were misappropriating .AI domains using their brands.

Submitted by Gregory Rigby on

"Russia's Sandworm Hacking Unit Targets Ukrainian Telecom Providers"

"Russia's Sandworm Hacking Unit Targets Ukrainian Telecom Providers"

According to a recent report from Ukrainian cybersecurity authorities, the Russian state hacking group Sandworm has targeted at least 11 Ukrainian Internet and telecommunication providers since May. Ukraine's Computer Emergency Response Team (CERT-UA) said the attacks resulted in service interruptions and potential data breaches. During the ongoing war, hackers target telecommunication providers in Russia and Ukraine to disrupt communications and Internet access.

Submitted by Gregory Rigby on

"ServiceNow Leak: Thousands of Companies at Risk"

"ServiceNow Leak: Thousands of Companies at Risk"

According to cybersecurity expert Daniel Miessler, a potential data exposure issue within a built-in capability of the digital business platform ServiceNow has been identified, which could enable unauthenticated users to extract data from records. The types of data exposed include names, email addresses, and internal documents. The exposure likely impacts thousands of companies. Miessler suspects the vulnerability stems from a misconfiguration of a widget or component in ServiceNow's system called Simple List, which organizes records into easily readable tables.

Submitted by Gregory Rigby on

"'EtherHiding' Blockchain Technique Hides Malicious Code in WordPress Sites"

"'EtherHiding' Blockchain Technique Hides Malicious Code in WordPress Sites"

A threat actor has been using blockchain technology to hide malicious code in a campaign involving fake browser updates that distribute malware, including RedLine, Amadey, and Lumma. Although the abuse of blockchain technology is typically seen in attacks targeting cryptocurrency, the EtherHiding technique shows how attackers can use it for other types of malicious activity. Over the past two months, Guardio researchers have been observing the campaign dubbed ClearFake, in which users are tricked into downloading malicious fake browser updates from at least 30 compromised WordPress sites.

Submitted by Gregory Rigby on
Subscribe to