Oct 24, 2018

Sector brief for 2018-10-23

HEALTHCARE

Nil

TRANSPORT

  1. NSA Tools Used to Attack Nuclear Energy Firms
  2. Hacking operations with DarkPulsar and other tools developed by the NSA

BANKING & FINANCE

  1. Case Study: Ransomware
  2. Banking Trojan Infections Persist Throughout the State
  3. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  4. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  5. What do you think the combination of the #TrickBot banking Trojan to #IcedID means for the future of banking #Trojans?
  6. Phishing attacks becoming more targeted, phishers love Microsoft the most
  7. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  8. Morrisons loses appeal over data breach
  9. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  10. Can Cybercriminals Hack Blockchain?

INFORMATION & TELECOMMUNICATION

  1. Microsoft Windows zero-day disclosed on Twitter, again
  2. When Ransomware Stopped Working Harder and Started Working Smarter
  3. Status of Today’s Email as a Malware Vector
  4. Banking Trojan Infections Persist Throughout the State
  5. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  6. Battling Bots: How to Find Fake Twitter Followers
  7. Top 10 security steps in Microsoft 365 that political campaigns can take today
  8. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  9. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  10. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  11. Identify when your data is exposed, your brand is abused, or your company is mentioned on the dark web. Test
  12. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  13. Facebook has seen several data breaches in the last few months, leading the company to look into acquiring a
  14. 5 Ways #Cybercriminals Can Access Your Emails Without Phishing [Infographic]:
  15. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  16. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  17. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  18. "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
  19. Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne
  20. Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID

FOOD

Nil

WATER

Nil

ENERGY

  1. FireEye links Russia-owned lab to Trisis developers
  2. NSA Tools Used to Attack Nuclear Energy Firms
  3. Hacking operations with DarkPulsar and other tools developed by the NSA

GOVERNMENT & PUBLIC SERVICE

  1. FireEye links Russia-owned lab to Trisis developers
  2. Case Study: Protecting PII
  3. Banking Trojan Infections Persist Throughout the State
  4. Triton Malware Linked to Russian Government Research Institute
  5. Securing Government Operations with Cloud-based Malware Analysis
  6. Top 10 security steps in Microsoft 365 that political campaigns can take today
  7. This is how government spyware StrongPity uses security researchers' work against them
  8. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  9. Indiana National Guard Suffers Ransomware Attack
  10. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  11. Indiana National Guard hit by ransomware
  12. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  13. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  14. Saudi Investment Site Defaced After Journalist’s Murder
  15. CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
  16. Morrisons loses appeal over data breach
  17. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  18. Can Cybercriminals Hack Blockchain?