Nov 13, 2018

Daily brief for 2018-11-12

ASIA

  1. Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
  2. France seeks Global Talks on Cyberspace security and a “code of good conduct”
  3. Patched-up Adobe ColdFusion vulnerability exploited by hackers
  4. Chinese Head Fired After Cryptomining at School
  5. IT threat evolution Q3 2018. Statistics
  6. IT threat evolution Q3 2018
  7. Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
  8. Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks

WORLD

  1. Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
  2. U.S. Chip Cards Are Being Compromised in the Millions
  3. Malware of the 90s: Remembering the Michelangelo and Melissa viruses
  4. France seeks Global Talks on Cyberspace security and a “code of good conduct”
  5. Popular Data Storage Devices Compromised Due to Flawed Security
  6. Used Data Storage Devices Have Security Flaws
  7. U.S. Chip Cards Are Being Compromised in the Millions:
  8. U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
  9. Chinese Head Fired After Cryptomining at School
  10. IT threat evolution Q3 2018. Statistics
  11. IT threat evolution Q3 2018
  12. Norway’s IT industry must tackle security vulnerabilities
  13. In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
  14. Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks

ATTACKS

  1. Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
  2. StatCounter Compromise
  3. Emotet Campaign Ramps Up with Mass Email Harvesting Module
  4. 2018 On Track to Be One of the Worst Ever for Data Breaches
  5. U.S. Chip Cards Are Being Compromised in the Millions
  6. Unable to remember his password, man sent letter bomb to Bitcoin exchange
  7. Third-party data breach exposes info of Alabama hospital job applicants
  8. Small number of HSBC customer accounts compromised in data breach. Often hackers will make use of user names and passwords compromised
  9. Avast Improves Phishing Detection | Avast
  10. Popular Data Storage Devices Compromised Due to Flawed Security
  11. Phishing Training is a Tool, Not a Solution
  12. U.S. Chip Cards Are Being Compromised in the Millions:
  13. What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
  14. The History of Data Breaches
  15. Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
  16. Emotet Campaign Ramps Up with Mass Email Harvesting Module
  17. Reported breaches in the first 9 months of 2018 exposed 3.6 billion records
  18. ADHA privacy boss reportedly quits as My Health Record faces first big test

THREATS

  1. Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
  2. Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
  3. Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
  4. How CIOs can manage blockchain security: 4 tips
  5. Malware-Laced App Lurked on Google Play For a Year
  6. DJI Drone Web App Security Flaw Could Let Attackers Take Over Drones
  7. CVE-2018-6981, CVE-2018-6982: uninitialized stack memory usage vulnerabilities on VMware ESXi, Workstation, and Fusion
  8. Unable to remember his password, man sent letter bomb to Bitcoin exchange
  9. Flaw in WordPress plugin allowed unauthorized admin access, backdoors
  10. Steam Bug Allowed Unlimited Free Downloads
  11. Malware of the 90s: Remembering the Michelangelo and Melissa viruses
  12. Steam bug exposes license keys for every game available on platform
  13. A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
  14. Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos
  15. Google’s data charts path to avoiding malware on Android
  16. Botnet pwns 100,000 routers using ancient security flaw
  17. Used Data Storage Devices Have Security Flaws
  18. Patched-up Adobe ColdFusion vulnerability exploited by hackers
  19. U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
  20. Cryptomining malware using Windows Installer to remain hidden
  21. #SamSam #ransomware targeted 67 organizations in 2018, according to @symantec research. By @MaddieBacon11
  22. Chinese Head Fired After Cryptomining at School
  23. A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
  24. An #Android app booby-trapped with #malware was recently taken down from Google Play — after being available for download for
  25. New Acunetix Build Adds Detection for CSP, SRI, Node.js, and Ghostscript RCE Vulnerabilities
  26. Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
  27. Norway’s IT industry must tackle security vulnerabilities
  28. In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
  29. How does new MacOS malware target users through chat?
  30. Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
  31. How does your enterprise ensure a secure #ApplicationSecurityTesting process?
  32. Happy #Monday, #CyberSecurity folks! Catch up on the #blog, and discover how fileless #malware is changing how organizations treat
  33. Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
  34. Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents
  35. Unearthing Ransomware Characteristics Using Classification Taxonomy
  36. Overt Command and Control is now live! Check out @william_knows & @nmonkee's talk at this year's #BlueHatv18 exploring the reality
  37. Multiple Vulnerabilities Discovered In Roche Handheld Medical Devices
  38. DOD file sharing tool disabled due to vulnerability

CRIME

  1. Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
  2. StatCounter Compromise
  3. Flaw in WordPress plugin allowed unauthorized admin access, backdoors
  4. Third-party data breach exposes info of Alabama hospital job applicants
  5. What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
  6. Chinese Head Fired After Cryptomining at School
  7. A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
  8. IT threat evolution Q3 2018. Statistics
  9. IT threat evolution Q3 2018
  10. Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks

POLITICS

  1. Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
  2. France seeks Global Talks on Cyberspace security and a “code of good conduct”
  3. IT threat evolution Q3 2018
  4. Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents