Washington Think Tank Organizations Hacked by APT29
August 31, 2016
Russian-linked cyber-espionage group known as APT29 has attempted to hack several Washington-based think tank organizations.
OneLogin Announces Security Breach That Exposed Customer “Secure Notes”
August 31, 2016
OneLogin has announced a server security breach that allowed an intruder to take a peek at customer Secure Notes thanks to a bug in the company’s logging procedures.
SWIFT discloses more cyber thefts, pressures banks on security
August 31, 2016
SWIFT, the global financial messaging system, on Tuesday disclosed new hacking attacks on its member banks as it pressured them to comply with security procedures instituted after February’s high-profile $81 million heist at Bangladesh Bank.
One of Europe’s Biggest Companies Loses €40 Million in Online Scam
August 31, 2016
Leoni AG, Europe’s biggest manufacturer of wires and electrical cables and the fourth-largest vendor in the world, has announced it lost €40 million ($44.6 million) following an online scam that tricked one of its financial officers into transferring funds to the wrong bank account.
India, UK cybersecurity watchdogs sign pact for cooperation
August 31, 2016
State-run cybersecurity bodies of India and the UK have signed a Memorandum of Understanding for close cooperation on counter cyberattacks these countries face.
Cybercrime Will Double by 2021 with an Annual Profit of $6 Trillion
August 31, 2016
According to a report, cybercrime will double within 5 years, jumping from $3 trillion this year to the whopping $6 trillion by 2021.
Dropbox Hacked — More Than 68 Million Account Details Leaked Online
August 30, 2016
Hackers have obtained credentials for more than 68 Million accounts for online cloud storage platform Dropbox from a known 2012 data breach.
August 30, 2016
At least three Linux server administrators have complained at the time of writing about a new ransomware variant called FairWare that targets web servers running Linux.
With the development of new uses and new technologies, security lies at the heart of a hyper-connected society
August 30, 2016 – PRESS RELEASE
Public and private actors will gather in Lille on 24 and 25 January 2017 for the International Cybersecurity Forum (FIC 2017), to exchange ideas around the challenges of an increasingly connected world and to work at establishing a secure digital environment.
Kaspersky Fixes Bugs That Allowed Attackers to Crash Its Antivirus
August 29, 2016
Russian security vendor Kaspersky Lab has recently patched four vulnerabilities in its flagship product, which allowed attackers to crash the antivirus and disclose information from the computer’s memory.
Two US State Election Systems Hacked to Steal Voter Databases — FBI Warns
August 29, 2016
A group of unknown hackers or an individual hacker may have breached voter registration databases for election systems in at least two US states,
Multiple Australian Government Agencies Compromised in the Last Five Years
August 29, 2016
Australian authorities suspect that Chinese hackers are behind cyber-attacks against several government agencies at the Department of Foreign Affairs and Trade, the Defence Department, and the Bureau of Meteorology.
Meet USBee, the malware that uses USB drives to covertly jump airgaps
August 29, 2016
Technique works on virtually all USB drives with no modifications necessary
Microsoft joining China’s cybersecurity council
August 28, 2016
China is allowing foreign technology companies to join a key government committee in an effort to ease foreign concerns over its strict cybersecurity policies
Finding the right security professional: The true skills challenge
August 28, 2016
Backed by a $19 trillion industry, cyber criminals are finding new and complex ways of compromising systems and are evading detection more than ever before.
VirusTotal Adds Support for CrowdStrike and Invincea Scanners
August 28, 2016
Both are part of the new wave of next-gen anti-malware products that rely on machine learning algorithms to analyze behavior and network activity in order to detect anomalies and flag malware.
Here’s how much money you could make with a career in cybersecurity
August 28, 2016
The difference between cybersecurity professionals and everyone else in the information-technology sector isn’t just a matter of skill set, it’s also a matter of mindset.
Opera Browser Sync Service Hacked; Users’ Data and Saved Passwords Compromised
August 27, 2016
Opera has reset passwords of all users for one of its services after hackers were able to gain access to one of its Cloud servers this week
2000 officials receive e-governance, cyber security training
August 26, 2016
Some 2,000 government officials have received training from reputed international organisations on governance, project management and cyber security issues.
Ensuring Cybersecurity In Fintech: Key Trends And Solutions
August 25, 2016
Given the growth, dynamism, and complexity of the digital financial ecosystem, it is inevitable that some solutions will be insufficiently secure against cyberattacks.
Exploits patched by Apple today hint at years of surreptitious government hacks
August 25, 2016
You’ll want to be updating your iOS devices to 9.3.5, the version released today by Apple — especially if you’re a prominent human rights activist.
The biggest threat facing connected autonomous vehicles is cybersecurity
August 25, 2016
One of the biggest threats that society will face as transportation transforms in the coming years is vehicle cybersecurity.
Asian companies have world’s worst cybersecurity says study
August 24, 2016
Many Asian organisations are badly defended against cyber-attacks, a year-long investigation by US security company Mandiant indicates.
Military submarine maker springs leak after “hack” – India, Oz hit dive alarm
August 24, 2016
Massive leak of French shipbuilder’s documents reveal detailed defense plans.
August 23, 2016
Company still investigating, no fixes or mitigations out yet.
Critical Flaws Let Attackers Hijack Cellular Phone Towers
August 23, 2016
Three critical security flaws in BTS stations allow attackers to compromise, hijack, crash mobile cell towers, security researchers from Zimperium have discovered.
US Ports Targeted with Zero-Day SQL Injection Flaw
August 23, 2016
Ports in the US have reported attacks using an SQL injection flaw made public by a hacker known as bRpsd, who released a fully working exploit online without notifying the vendor in advance.
Cisco Exploit Leaked in NSA Hack Modifies to Target Latest Version of Firewalls
August 23, 2016
Recently released NSA exploit from “The Shadow Brokers” leak that affects older versions of Cisco System firewalls can work against newer models as well.
United States Air Force hopes to improve cyber security with migration to Windows 10
August 22, 2016
The Air Force is slated to upgrade to Windows 10 during the next couple years to improve the Air Force’s cybersecurity posture, lower the cost of information technology and streamline the IT operating environment.
New Banking Trojan Uses PowerShell to Alter Internet Explorer Proxy Settings
August 22, 2016
Attacks currently detected only against Brazilian banks.
Facebook Photos Lead to Hacking of Facial Recognition System
August 22, 2016
The hackers can use two-dimensional pictures, photos, and even 3D face replicas to compromise a system.
Despite billions spent on cybersecurity, companies aren’t truly safe from hacks
August 22, 2016
Companies on a treadmill to stay ahead of data thieves.
Bounty hunters are legally hacking Apple and the Pentagon – for big money
August 22, 2016
A growing roster of ‘white hat’ hackers earn thousands finding chinks in the digital armor of the US government and companies such as Apple and Google.
Many hospitals transmit your health records unencrypted
August 22, 2016
About 32% of hospitals and 52% of non-acute providers — such as outpatient clinics, rehabilitation facilities and physicians’ offices — are not encrypting data in transit, according to a new survey.
Cybercrime damages expected to cost the world $6 trillion by 2021
August 22, 2016
Massive expansion of the global cyber attack surface will fuel the cybercrime epidemic.
China edges ahead in the race to build hack-proof cyber security systems
August 21, 2016
The international power struggle for the control of data has intensified with a number of Chinese companies now trying to challenge entrenched cloud vendors such as Microsoft, Google and Amazon.
August 19, 2016
Twitter said Thursday it has shut down 235,000 accounts linked to violent extremism in the last six months alone. That brings the total number of terminated Twitter accounts associated with terrorism to 360,000 since mid-2015.
UAC Bypass with Elevated Privileges Works on All Windows Versions
August 19, 2016
Security researcher has discovered a simple method of bypassing the Windows User Account Control (UAC) mechanism that affects all supported Windows versions, which in some exploitation scenarios leads to attackers executing commands with elevated privileges.
August 19, 2016 – PRESS RELEASE
The Cyber Security Exchange Asia 2016 conference will be taking place on the 27-29th November 2016 in Phuket, Thailand.
August 18, 2016
London City Police officers arrested an unnamed 32-year-old Sage female employee at the London Heathrow airport on Wednesday, August 17, 2016.
Does modern cyber security damage productivity?
August 18, 2016
Embracing the digital transformation is vital for business productivity, but increased cyber vulnerabilities must also be addressed.
‘Protectionist’ rejection of China’s State Grid misses real energy security issue
August 18, 2016
The Australian government’s decision to block the 99-year lease of 50.4% of our largest energy grid to the State Grid Corporation of China has been dubbed “protectionist” by China’s Ministry of Commerce.
August 17, 2016
International conference CYBER TRENDS accompanying with CYBER WORKSHOPS, live demostration and simulation test areas aims to deepen close cooperation in European cyber security.
Cisco Patches Zero-Day Included in Shadow Brokers Leak
August 17, 2016
Hacking tools from The Shadow Brokers leak named EPICBANANA, JETPLOW, and EXTRABACON, contain exploits that can compromise Cisco devices.
The NSA Hack — What, When, Where, How, Who & Why?
August 17, 2016
A mysterious group of hackers calling themselves “The Shadow Brokers” claimed it hacked an NSA-linked group and released some NSA hacking tools with a promise to sell more private “cyber weapons” to the highest bidder.
Industrial Espionage Hackers Targeted 130 Companies in More than 30 Countries
August 17, 2016
Since March 2015, a well-organized cyber-crime syndicate has targeted more than 130 companies in over 30 countries for the purpose of industrial espionage.
5 steps to cybersecurity for Internet of Things medical devices
August 17, 2016
Connected medical devices – components of the so-called Internet of Things – are multiplying, opening more holes in security and creating terrible potential for patient casualties.
Someone is Spying on Researchers Behind VeraCrypt Security Audit
August 16, 2016
After TrueCrypt mysteriously discontinued itself, VeraCrypt became the most popular open source disk encryption software used by activists, journalists, and privacy conscious people.
US Dept of Energy lobs out $34m for bright ideas on securing grids
August 16, 2016
The US Department of Energy (DOE) has awarded $34m in funding to pay for 12 programs aimed at improving the security of the US power grid.
Linux Flaw Exposes Over 1.4 Billion Androids to Spying Attacks
August 16, 2016
A Linux Flaw, which was first detected this spring, not only gives anyone the ability to hijack internet traffic but it also affects 80% of Android devices, which equals to about 1.4 billion devices.
Shadow Broker hacking group auctions off claimed NSA online spy tools
August 16, 2016
Did someone crack Equation Group or are they scammers?
FalseCONNECT Vulnerability Affects Software From Apple, Microsoft, Oracle
August 16, 2016
Researcher Jerry Decime revealed details about a security vulnerability that allows an attacker to gain a Man-in-the-Middle position and intercept HTTPS traffic thanks to flaws in the implementation of proxy authentication procedures in various products.
Germany Announces Plans to Create Cyber Security Unit
August 15, 2016
In the wake of recent terrorist attacks, the German government is rethinking its approach toward cyber-security, the government is readying plans to modify several German laws and create a new cyber security unit inside its police force.
China Launches World’s 1st ‘Hack-Proof’ Quantum Communication Satellite
August 15, 2016
The satellite is designed to develop a ‘Hack-Proof’ communications system in this age of global electronic surveillance and cyber attacks by transmitting uncrackable encryption keys from space to the ground.
Starwood, Marriott, Hyatt, IHG hit by malware: HEI
August 15, 2016
A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged payment card data from tens of thousands of food, drink and other transactions.
Financial sector faces era of cyber mega heists
August 15, 2016
Banks and other financial institutions are threatened by a new breed of elite cyber criminals running professional operations that will use any means to achieve their goals, says Barclays security chief.
The inside man: Sage cyber security breach puts 280 UK firms at risk
August 15, 2016
This latest cyber attack shows once again that cyber security is losing its battle against cyber criminals, and that an internal threat is just as dangerous as an external one.
New Hack Uses Hard Drive’s Noise to Transfer Stolen Data from Air-Gapped Computer
August 12, 2016
Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place for storing data in critical infrastructures such as industrial control systems, financial institutions, and classified military networks.
Hacker Releases More Democratic Party Documents
August 12, 2016
A hacker believed to be tied to the Russian intelligence services made public another set of internal Democratic Party documents on Friday, including the personal cellphone numbers and email addresses of nearly 200 lawmakers.
Cybersecurity skills crisis creating vulnerabilities
August 12, 2016
Cybersecurity education deficiencies and other factors cause direct damage to companies, a report from Intel Security finds.
Iran Investigates If Series of Oil Industry Accidents Were Caused by Cyber Attack
August 12, 2016
A series of fires and explosions in recent weeks has killed one and caused major damage.
How DoD holds service leaders accountable to ‘back to basics’ cyber program
August 11, 2016
After major breaches at the Office of Personnel Management forced all agencies to buckle down and address their critical vulnerabilities, Defense leaders say they’re beginning to see a noticeable culture change in how each service thinks about cybersecurity.
Business groups appeal to China over cybersecurity law
August 11, 2016
A coalition of 46 business groups from the United States, Europe and Asia has appealed to China to change proposed cybersecurity rules they warn will harm trade and isolate the country.
U.S. Intelligence to Help Companies Avert Supply-Chain Hacking
August 10, 2016
U.S. intelligence officials are planning to provide information including classified threat reports to companies about the risks of hacking and other crimes tied to the supplies and services they buy.
New Microsoft Secure Boot Policies Create a Vulnerability in Windows Devices
August 11, 2016
The vulnerability allows hackers to bypass Secure Boot and install rootkits and bootkits on devices running Windows 8.1, Windows RT 8.1, Windows Server 2012 and Windows 10.
Ransomware Spam Flood Targeted US Govt. Agencies, Educational Institutions
August 10, 2016
Between August 3 and August 9, a security firm detected hundreds of thousands of spam email messages spreading the CrypFile2 ransomware, mainly to US-based government agencies and educational institutions.
Schneider Electric Publishes New White Paper on Cyber Security Issues Affecting Data Centre Remote Monitoring
August 10, 2016
The White Paper elaborates in detail the finer considerations of eight principal practices, taking into account personnel issues, security testing of the monitoring platform, networking security and the physical security.
Monsoon APT Has Been Hacking Targets Around the Globe Since 2010
August 10, 2016
A group of state-sponsored hackers supposedly operating out of India, based on current evidence, have been targeting thousands of individuals and organizations around the globe for almost six years.
Elektrilevi joins European network for cyber-security
August 10, 2016
Elektrilevi, Estonia’s largest network operator with around 475,000 customers, 64,000 kilometres of power lines and more than 24,000 substations, has joined the European Network for Cyber Security (ENCS) with the stated aim of improving its cyber-resilience.
2 Hackers Win Over 1 Million Air Miles each for Reporting Bugs in United Airlines
August 9, 2016
Two computer hackers have earned more than 1 Million frequent-flyer miles each from United Airlines for finding and reporting multiple security vulnerabilities in the Airline’s website.
“Foreign Hackers” Launch DDoS Attacks on Australia’s Census Website
August 9, 2016
The Australian Bureau of Statistics (ABS) says that foreign hackers launched cyber-attacks on the ABS Census website yesterday in an attempt to sabotage its “Census Night.”
Around 16 Zero-Days Added to Dark Web Marketplaces Each Month
August 9, 2016
A group of ten researchers from Arizona State University created a system that automatically scans and detects hacking-related products added to Dark and Deep Web marketplaces and hacking forums.
Even Solar Panels Can Be Hacked
August 9, 2016
In some systems this is possible due to the open Wi-Fi access point that is linked with the MMU (Management Unit) of the solar array.
Energy needs better data, digital rights management
August 9, 2016
As the one-year anniversary for the Cybersecurity Act of 2015 approaches, the Department of Energy is close to meeting all the mandates contained therein, however, the agency still has some metrics to meet, according to an inspector general report.
Three Ways To Re-imagine The Role Of Global Security Teams
August 8, 2016
Cyber attacks remain a fast growing business, despite investments organizations make in their cyber defense. What is often overlooked, however, but remains important, is a lack of holistic management approaches and organizational silos.
Strider Cyberespionage Group Hit Seven Targets in China, Russia, Belgium, Sweden
August 8, 2016
A cyber-espionage group has hit at least seven companies across four countries since October 2011, utilizing its homegrown malware, a backdoor trojan called Remsec.
August 1, 2016
South Korean investigators revealed this morning that they detected over 90 attempts to hack the email accounts of various state officials, of which 56 were successful.