Threat report for 2018-10-23
DATA BREACH & DATA LOSS
- Case Study: Protecting PII
- An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
- Top 10 security steps in Microsoft 365 that political campaigns can take today
- Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
- Thousands of applications affected by a zero-day issue injQuery File Upload plugin
- Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
- Identify when your data is exposed, your brand is abused, or your company is mentioned on the dark web. Test
- Thousands of Applications Vulnerable to RCE via jQuery File Upload
- Facebook has seen several data breaches in the last few months, leading the company to look into acquiring a
- Police have issued a fresh warning concerning Fortnite and players giving out their personal details online.
Cheshire Police posted on Facebook,
- Adult websites shuttered after 1.2 million user details exposed
- #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
- jQuery? More like preyQuery: File upload tool can be exploited to hijack at-risk websites
- "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
- “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
- A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
- Morrisons loses appeal over data breach
- Morrisons loses appeal against data breach liability ruling
- A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may
DENIAL-OF-SERVICE
- DDoS-Capable IoT Botnet 'Chalubo' Rises
- Chalubo DDoS Botnet Compromises Linux SSH Servers Using Brute-Force Attacks
- Netscout Launches Arbor Edge Defense for Enterprise DDoS Security
- Oracle Doubles Down on Cloud Security With CASB, WAF, DDoS Protection
MALVERTISING
Nil
PHISHING
- Phishing is still the most commonly used attack on organizations, survey says
- New Phishing Attack That Uses Multiple Replica Sign-In Pages
- How sophisticated phishing grants attackers total control of your computer
- How sophisticated phishing grants attackers total control of your computer
- 5 Ways #Cybercriminals Can Access Your Emails Without Phishing [Infographic]:
- Phishing attacks becoming more targeted, phishers love Microsoft the most
- Learn how hackers launched #phishing attacks against @netflix users with expert Michael Cobb of @thehairyITdog
- "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
- Phishing Report Shows Microsoft, Paypal, & Netflix as Top Targets
- 4 suggerimenti per utilizzare al meglio il vostro #password manager e generare password davvero efficaci. Ebbene sì, repetita juvant :)
WEB DEFACEMENT
- Hackers Defaced Davos In The Desert To Show Image Of Murdered Journalist
- Saudi Investment Site Defaced After Journalist’s Murder
BOTNET
- DDoS-Capable IoT Botnet 'Chalubo' Rises
- Chalubo DDoS Botnet Compromises Linux SSH Servers Using Brute-Force Attacks
- Battling Bots: How to Find Fake Twitter Followers
- Bots Targeting SSH Servers and Brute-Forcing Entry
RANSOMWARE
- When Ransomware Stopped Working Harder and Started Working Smarter
- City Pays $2K in Ransomware, Stirs ‘Never Pay’ Debate
- Case Study: Ransomware
- Indiana National Guard Suffers Ransomware Attack
- Indiana National Guard hit by ransomware
- Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne
CRYPTOMINING & CRYPTOCURRENCIES
- Why the blockchain is not secure
- Trade.io Cold Wallet Hacked Losing 50 Million TIO Tokens – TIO Coin To Be Forked
- Why is Elon Musk promoting this Bitcoin scam? (He’s not)
- Report: Cryptocurrency hackers earned $20M with 51-percent attacks in 2018
- Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID
- Can Cybercriminals Hack Blockchain?
- A Beginner’s Guide to Bitcoin Mining (Bitcoin Mining 101)
MALWARE
- Burned malware returns, according to Cylance: is Hacking Team responsible?
- Status of Today’s Email as a Malware Vector
- Case Study: Destructive Malware
- Banking Trojan Infections Persist Throughout the State
- Triton Malware Linked to Russian Government Research Institute
- FireEye links Russian research lab to Triton ICS malware attacks
- Securing Government Operations with Cloud-based Malware Analysis
- How RATs infect computers with malicious software
- This is how government spyware StrongPity uses security researchers' work against them
- Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
- Inside Safari Extensions | Malicious Plugins Remain on Mojave
- Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
- H-Worm and jRAT Malware: Two RATs are Better than One
- How RATs infect computers with malicious software
- What do you think the combination of the #TrickBot banking Trojan to #IcedID means for the future of banking #Trojans?
- Updated Azorult malware for sale on the Dark Web
- UK and US sign military Cyber Accord to dominate cyber domain - with help from business
- Chinese Cyber Espionage Group using Datper Trojan
- Burned malware returns, says Cylance report: Is Hacking Team responsible?
EXPLOIT
Nil
VULNERABILITY
- DHS warns of another dangerous flaw in Advantech WebAccess SCADA software
- Microsoft Windows zero-day disclosed on Twitter, again
- AWS FreeRTOS Riddled with Security Vulnerabilities | Avast
- Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
- Thousands of applications affected by a zero-day issue injQuery File Upload plugin
- Grave TCP/IP Flaws In FreeRTOS Leave IoT Gear Open To Mass Hijacking
- Patch now! Multiple serious flaws found in Drupal
- Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
- Amazon Patched Multiple IoT Vulnerabilities Affecting Its Smart Devices
- Amazon patches IoT and critical infrastructure security flaws
- Patch me, if you can: Grave TCP/IP flaws in FreeRTOS leave IoT gear open to mass hijacking
- Several vulnerabilities were found in controllers made by @Universal_Robot. Discover what these #robot controllers are used for and how
- How do newly found flaws affect robot controllers?
- Firmware zero-day leaves 2m storage devices open to RCE
- A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
- CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
- Bug Spells Doom for Nearly-Vacant Google+ Network
- The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
- libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
- WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
- Different Vendors Confirm The Impact Of LibSSH Flaw On Their Products
- FreeRTOS IoT OS Critical Vulnerabilities Affected Million of Smart Home & Critical Infrastructure Based IoT Devices
- LIVE555 Streaming library affected by remote code execution vulnerability
- Windows 10 1809 Zip Extraction Bug Overwrites Files without Confirmation
- A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may