Daily brief for 2018-11-12
ASIA
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
- Patched-up Adobe ColdFusion vulnerability exploited by hackers
- Chinese Head Fired After Cryptomining at School
- IT threat evolution Q3 2018. Statistics
- IT threat evolution Q3 2018
- Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
WORLD
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- U.S. Chip Cards Are Being Compromised in the Millions
- Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
- Popular Data Storage Devices Compromised Due to Flawed Security
- Used Data Storage Devices Have Security Flaws
- U.S. Chip Cards Are Being Compromised in the Millions:
- U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
- Chinese Head Fired After Cryptomining at School
- IT threat evolution Q3 2018. Statistics
- IT threat evolution Q3 2018
- Norway’s IT industry must tackle security vulnerabilities
- In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
ATTACKS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- StatCounter Compromise
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- 2018 On Track to Be One of the Worst Ever for Data Breaches
- U.S. Chip Cards Are Being Compromised in the Millions
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- Third-party data breach exposes info of Alabama hospital job applicants
- Small number of HSBC customer accounts compromised in data breach.
Often hackers will make use of user names and passwords compromised
- Avast Improves Phishing Detection | Avast
- Popular Data Storage Devices Compromised Due to Flawed Security
- Phishing Training is a Tool, Not a Solution
- U.S. Chip Cards Are Being Compromised in the Millions:
- What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
- The History of Data Breaches
- Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- Reported breaches in the first 9 months of 2018 exposed 3.6 billion records
- ADHA privacy boss reportedly quits as My Health Record faces first big test
THREATS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
- Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
- How CIOs can manage blockchain security: 4 tips
- Malware-Laced App Lurked on Google Play For a Year
- DJI Drone Web App Security Flaw Could Let Attackers Take Over Drones
- CVE-2018-6981, CVE-2018-6982: uninitialized stack memory usage vulnerabilities on VMware ESXi, Workstation, and Fusion
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- Flaw in WordPress plugin allowed unauthorized admin access, backdoors
- Steam Bug Allowed Unlimited Free Downloads
- Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- Steam bug exposes license keys for every game available on platform
- A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
- Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos
- Google’s data charts path to avoiding malware on Android
- Botnet pwns 100,000 routers using ancient security flaw
- Used Data Storage Devices Have Security Flaws
- Patched-up Adobe ColdFusion vulnerability exploited by hackers
- U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
- Cryptomining malware using Windows Installer to remain hidden
- #SamSam #ransomware targeted 67 organizations in 2018, according to @symantec research. By @MaddieBacon11
- Chinese Head Fired After Cryptomining at School
- A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
- An #Android app booby-trapped with #malware was recently taken down from Google Play — after being available for download for
- New Acunetix Build Adds Detection for CSP, SRI, Node.js, and Ghostscript RCE Vulnerabilities
- Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
- Norway’s IT industry must tackle security vulnerabilities
- In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
- How does new MacOS malware target users through chat?
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
- How does your enterprise ensure a secure #ApplicationSecurityTesting process?
- Happy #Monday, #CyberSecurity folks! Catch up on the #blog, and discover how fileless #malware is changing how organizations treat
- Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
- Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents
- Unearthing Ransomware Characteristics Using Classification Taxonomy
- Overt Command and Control is now live! Check out @william_knows & @nmonkee's talk at this year's #BlueHatv18 exploring the reality
- Multiple Vulnerabilities Discovered In Roche Handheld Medical Devices
- DOD file sharing tool disabled due to vulnerability
CRIME
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- StatCounter Compromise
- Flaw in WordPress plugin allowed unauthorized admin access, backdoors
- Third-party data breach exposes info of Alabama hospital job applicants
- What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
- Chinese Head Fired After Cryptomining at School
- A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
- IT threat evolution Q3 2018. Statistics
- IT threat evolution Q3 2018
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
POLITICS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- France seeks Global Talks on Cyberspace security and a “code of good conduct”
- IT threat evolution Q3 2018
- Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents