Nov 6, 2018

Daily brief for 2018-11-05

ASIA

  1. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  2. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  3. Persian Stalker pillages Iranian users of Instagram and Telegram
  4. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3

WORLD

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  3. What were the DDoS numbers for Q2 & Q3 2018?
  4. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  5. Your personal data is widely available to hackers
  6. Magecart Infiltrates U.K. Online Retailer Kitronik POS
  7. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  8. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  9. Magecart Strikes Again, and Kitronik Is Latest Victim
  10. Inception Attackers Target Europe with Year-old Office Vulnerability
  11. Kemp Investigates Dems, Not the Reported Vulnerability
  12. Australian shipbuilder Austal hit by data breach
  13. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  14. Equifax Set to Share More PII with Experian
  15. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  16. Over 80,000 Facebook User Accounts Compromised
  17. Why malware attacks should no longer be a problem for businesses
  18. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
  19. Persian Stalker pillages Iranian users of Instagram and Telegram
  20. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  21. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
  22. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
  23. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

ATTACKS

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018
  3. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  4. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  5. Your personal data is widely available to hackers
  6. This Tool Shows Exposed Cameras Around Your Neighborhood
  7. New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
  8. How to use Firefox Master Password.
  9. Why you should be using a password manager
  10. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  11. Australian shipbuilder Austal hit by data breach
  12. How did @Google eliminate successful #PhishingAttacks? Learn how employees used U2F authentication and physical #SecurityKeys to defend against phishing from
  13. Password Constraints and Their Unintended Security Consequences
  14. Equifax Set to Share More PII with Experian
  15. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  16. National biometric database could be on the way (and in private hands)
  17. Over 80,000 Facebook User Accounts Compromised
  18. Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
  19. How can U2F authentication end phishing attacks?
  20. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  21. "If an organization created #DMARC records for the first time, it would encounter syntax and content issues -- one of
  22. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  23. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
  24. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

THREATS

  1. Apache warns Struts 2.3 is using a library with a two year old critical flaw
  2. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  3. Online Radio Stations at Risk from Icecast Flaw
  4. No, blockchain isn't the answer to our voting system woes
  5. PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
  6. Flaws In Self-Encrypting SSDs Let Attackers Bypass Encryption
  7. New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
  8. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  9. Why Are Deserialization Vulnerabilities So Popular?
  10. Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
  11. Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
  12. Flaws in self-encrypting SSDs let attackers bypass disk encryption
  13. [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
  14. Inception Attackers Target Europe with Year-old Office Vulnerability
  15. Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm
  16. Kemp Investigates Dems, Not the Reported Vulnerability
  17. Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
  18. Flaw in Icecast streaming media server allows to take off online Radio Stations
  19. Security researchers exploit Intel hyperthreading flaw to break encryption
  20. .@ArmisSecurity researchers discovered two chip-level #Bluetooth vulnerabilities -- dubbed #Bleedingbit -- that could allow pseudo #RemoteCodeExecution on wireless access points.
  21. Vulnerabilities’ CVSS scores soon to be assigned by AI
  22. Cisco Products Affected By A Zero-Day SIP Inspection Vulnerability Exploited In The Wild
  23. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  24. Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
  25. High severity XML external entity flaw affects Sauter building automation product
  26. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  27. Blockhead makes blockchain easy for developers
  28. Why malware attacks should no longer be a problem for businesses
  29. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
  30. Mozilla Patched Multiple Security Vulnerabilities in Thunderbird 60.3
  31. Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone
  32. Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS
  33. Scammers Ride on Popular Vote411 Voter Info Site to Push Scareware Alerts
  34. The building blocks of blockchain-based digital identity
  35. Companies implementing DevSecOps address vulnerabilities faster than others
  36. How to Get Rid of Cortana Runtime Broker CPU Miner Virus
  37. The Ultimate Guide to Bug Bounty Platforms
  38. PortSmash – A New Side Channel Vulnerability in SMT/Hyper-Threading That Allows Attackers To Steal Sensitive Data
  39. Security Think Tank: Three ways to safeguard against application layer vulnerabilities
  40. Security Bug in Icecast Puts Online Radio Stations At Risk
  41. Researchers discover new zero-day vulnerability in EDGE browser
  42. Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay: - Currently gathering information (profiling) the mobile device it is installed
  43. Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
  44. Recently there have been a lot of packed Android malware around, so I decided to write a blog-post on how

CRIME

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Original Mirai botnet creator hit with hefty financial sentence
  3. Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
  4. Australian shipbuilder Austal hit by data breach
  5. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  6. Equifax Set to Share More PII with Experian
  7. Over 80,000 Facebook User Accounts Compromised
  8. Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
  9. Persian Stalker pillages Iranian users of Instagram and Telegram
  10. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  11. The Ultimate Guide to Bug Bounty Platforms

POLITICS

  1. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  2. Kemp Investigates Dems, Not the Reported Vulnerability
  3. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  4. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me