All Articles (1100)

Sort by

10748540290?profile=RESIZE_400xAs a cyber security professional and you are asked about the biggest cybersecurity threats facing business, which one springs to mind first?  Maybe it is relentless ransomware attacks, with cyber criminals encrypting networks and demanding vast sums for a decryption key, even from hospitals.  Or maybe it is a devious malware attack, which lets hackers hide inside the network for months on end, stealing everything from usernames and passwords to bank details.  To be sure, both are on the list.  T

10746431292?profile=RESIZE_400xThe data stream that transmits human vital signs information from hospital patient monitors to a central hub can be hacked and falsified, according to cybersecurity researchers.  This highlights new concerns about medical device vulnerabilities.   Using a patient monitor and a compatible central monitoring station purchased from eBay, members of the McAfee Advanced Threat Research team were able to emulate and modify data coming from a patient monitor, including heart rate, oxygen levels and blo

10745848258?profile=RESIZE_400xFrom the Center for Security Policy: Over the past several years America has discovered that China has been carrying out various forms of espionage and intellectual property theft across the US, particularly targeting American companies in the tech sector.  Just this past week it was reported that components from the Chinese tech conglomerate Huawei installed in US telecommunications networks could disrupt communications at US nuclear bases.  While these companies set up American subsidiaries wh

10741559055?profile=RESIZE_400xBased on the US Federal Bureau of Investigation’s 2021 Internet Crime Report, there were 847,376 cybersecurity complaints last year, representing almost $7 billion in business losses.  That number is an increase from 301,580 claims representing $1.4 billion in losses in 2017.  All this even though businesses and governments spend billions of dollars to fight these attacks. Microsoft alone spends about $2 billion annually to address cybersecurity.  Why then, despite the big brains and big budgets

10740900057?profile=RESIZE_400xEncevo Group, an energy corporation based in Luxembourg, is dealing with an ongoing cyberattack by ransomware-as-a-service gang BlackCat.  Some digital services are still disrupted 12 days after the attack began, but the company says that energy supply has not been affected.  BlackCat is believed by researchers to retain hackers of DarkSide, the now-defunct ransomware group that attacked US gas provider Colonial Pipeline in 2021. 

Encevo Group cyberattack: In a dark web blog post on 29 July, Bla

10739614687?profile=RESIZE_400x

Data stored and transmitted by devices today are often sensitive in nature. This includes data relating to both the users and the enterprise. It is important that device data is properly protected so that an attacker cannot read or modify it. As well as appropriately protected, so that it is not stolen or tampered with. Without data encryption, all our digital information would be available to everyone. Cyberattacks today are disastrous for both corporations and individuals.

Fortunately, succes

10739450863?profile=RESIZE_400xThe Qbot malware was first discovered in 2008 and it has been used for a variety of purposes. It boasts a couple of prolific campaigns in recent years, particularly in 2020, but recent events indicate that it might have a slightly different coat of paint. We’ll begin our exploration here with a little bit of history on the Qbot malware, but from there we will move on to discussing DLL usage manipulation in Windows. In particular, we’ll go over a little bit about DLL side-loading: what it is, how

10739432681?profile=RESIZE_400xAmerican Honda Motor Co., http://www.honda.com  has confirmed that researchers were able to hack certain Honda vehicles' remote keyless entry system to unlock the doors and start the engine.  Recently, security researchers Kevin2600 and Wesley Li from Star-V Lab published information on a security bug they identified in the rolling codes mechanism of the remote keyless system of Honda vehicles, which allowed them to open car doors without the key fob present.  When sending a signal to unlock the

10739235682?profile=RESIZE_400xIsraeli media sources are reporting a cyber-attack on 30 June at Sapir College.  Students at Sapir College near the southern city of Sderot had received text messages stating that their personal information was being held for ransom by hackers.  “Last night at around 9:00 p.m., local time some seniors and graduates of Sapir College received a text message about their account being hacked. We would like to clarify and reassure you: that the hacking of the college’s network is being handled by the

10733059301?profile=RESIZE_400xActivity Summary - Week Ending on 29 July 2022:

  • Red Sky Alliance identified 25,992 connections from new IP’s checking in with our Sinkholes
  • Hetzner 10x
  • Analysts identified 309 new IP addresses participating in various Botnets
  • Ransomware UpDate
  • Adversary-in-the-Middle - AiTM
  • South Africa under Attack
  • Mercenary Spyware
  • T-Mobile
  • US Electric Grid
  • Kherson Ukraine

Link to full report: IR-22-210-002_weekly210.pdf

10732913864?profile=RESIZE_400xThe Port of Los Angeles has been making headlines after sharing an eye-opening statistic; the port faces around 40 million cyber-attacks per month.  As the busiest port in the western hemisphere handling $250 billion of cargo each year this astounding number of attacks could wreak havoc on the supply chain and international commerce.

The number of attacks has more than doubled since the beginning of the Covid-19 pandemic. The pandemic has also impacted the port’s efficiency as workers were force

10732911664?profile=RESIZE_400xIn the past five (5) years there has been a wide-ranging espionage operation in which more than 150 companies were targeted to be hacked in Germany alone: especially in the area of critical infrastructure companies.  Specifically, the hackers sought out electricity and water supply systems.  After years of investigation, the Germany’s State Criminal Police Office of Baden-Württemberg succeeded in identifying one of the suspected perpetrators: Pawel A.

This state backed hacker is said to belong t

10702174675?profile=RESIZE_400xGoogle Search and Drive are erroneously flagging links to Association for Computing Machinery (ACM) research papers and websites as ‘malware.’  This 'issue' was first reported by a German researcher.  Founded in 1947 and located in New York City US as a non-profit, ACM is the world's largest scientific and educational computing society.  As of 2019, ACM's membership comprises nearly 100,000 students and professionals involved in the field of computing.10704461667?profile=RESIZE_400x

Its research paper allegedly "violates" Goo

10675689695?profile=RESIZE_400xThe Infrastructure Investment and Jobs Act,[1] as passed by the US Congress in November 2021, authorizes $7.5 billion to help meet US President Joe Biden's goal of installing 500,000 electric vehicle charging stations by 2030.  Biden aims to have EVs represent half of all new vehicles being sold in the US by 2030.  But as the number of stations increases, the number of vulnerabilities does as well.

For the past several years, hackers have been busy targeting their cyber-attacks at electrical sys

10673501259?profile=RESIZE_400xFor the past month, a crimeware (crypto-mining) group infamously known as the 8220 Gang has expanded their botnet to roughly 30,000 global hosts.  This through the use of Linux and common cloud application vulnerabilities and poorly secured configurations.  In a recent campaign, the group was observed making use of a new version of the IRC botnet, PwnRig cryptocurrency miner, and its generic infection script. 

Link to full report, with IOCs: IR-22-208-001_8220Gang.pdf

[1] https://www.sentinelon

10672705059?profile=RESIZE_400xThe average cost of data breaches in the hospitality industry was around $1.72 million in 2020.  Hospitality includes Food & Beverage, Lodging, Recreation, Travel & Tourism and Meeting & Events industries.  Simultaneously, the increased use of technology in the hospitality industry became prevalent, whereby businesses began deploying IoT devices, interconnected networks, digitalized services, etc. Unfortunately, the deployment of emerging technologies marked an increase in cyberattacks in the ho

10669960480?profile=RESIZE_400xFor those of us Baby-Boomer who made our spending money cutting neighbors’ lawns on hot Mid-west summer afternoons, the following does not even seem fair.  Husqvarna, the maker of autonomous home lawn mowers https://www.husqvarna.com/us/robotic-lawn-mowers/  that look something like RC tactical assault vehicles, is releasing an unusual software update to celebrate a lonely robot thousands of miles away.  In early August 2022, the Curiosity Mars rover will turn ten years old.  Following the softw

10672047278?profile=RESIZE_400xGPS, or Global Positioning Systems, have become a staple of our lives – especially in the transportation sector.  Whether you are broadcasting your location for a rideshare or trying to find the quickest way to avoid traffic on your commute it seems that paper maps and printed directions have become a thing of the past.  It comes as no surprise that the more we rely on interconnected devices the more susceptible to cyber attacks we become.   This is exemplified through the Cybersecurity & Infras

10671575884?profile=RESIZE_400xOn a daily basis, an average cyber security team receives tens of thousands of security alerts.  Many analysts feel like they cannot get their heads above water during their shift.  This work atmosphere leads to quick physical burnout and even apathy in the face of this volume of continuous, tedious work.  HR surveys have found that some security analysts feel so overwhelmed they ignore alerts and even walk away from their computers.  In fact, these surveys found that 70% of security teams feel