Nov 15, 2018

Sector brief for 2018-11-13

HEALTHCARE

  1. Premier Media Conglomerate of Malaysia, Falls for Ransomware Infection
  2. The Cybersecurity Tech Accord endorses the Paris Call
  3. Former Employee Accessed Medical Records For Nearly a Year
  4. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  5. What’s on Our Minds for 2019? Key Themes from the RSA Speaker Selection Process

TRANSPORT

  1. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  2. What’s on Our Minds for 2019? Key Themes from the RSA Speaker Selection Process

BANKING & FINANCE

  1. Fake Crypto Wallet Apps Discovered in Google Play, Built Using Drag-n-Drop
  2. Premier Media Conglomerate of Malaysia, Falls for Ransomware Infection
  3. The Cybersecurity Tech Accord endorses the Paris Call
  4. Magecart Cybercrime Groups Mass Harvest Payment Card Data
  5. Seven Hacking Groups Operate Under “Magecart” Umbrella, Analysis Shows
  6. That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
  7. Nordstrom Quick to Tell Employees of a Data Breach
  8. Inside Magecart: RiskIQ and Flashpoint Release Comprehensive Report on the Assault on E-Commerce
  9. ‘Inside Magecart’ Exposes the Operation Behind the Web’s Biggest E-Commerce Scourge
  10. The Tactic Cybercriminals Use to Steal Bitcoin
  11. Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments
  12. Compromised security in millions of cards in the US

INFORMATION & TELECOMMUNICATION

  1. Fixed Facebook Privacy Bug Could Have Allowed Bad Actors to Steal Personal Info
  2. Facebook flaw opened your profile to data thieves
  3. Facebook Patches Another User Data Harvesting Bug
  4. That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
  5. Nordstrom Quick to Tell Employees of a Data Breach
  6. Facebook Bug Let Websites Access Private User Data
  7. Target and other high profile Twitter accounts exploited for cryptocurrency scams
  8. The Ontario Cannabis Store has reported a data breach that took place Nov. 1 through the Canada Post and affected
  9. Facebook patches another bug that could have allowed mass-harvesting of user data
  10. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  11. It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
  12. Microsoft Patch Tuesday — November 2018: Vulnerability disclosures and Snort coverage
  13. Another Facebook Bug Could Have Exposed Your Private Information
  14. #Gallmaker eschews custom malware, uses living off the land and publicly available #hack tools. Find out more:
  15. Attacker hijacks Elon Musk Twitter account to implement fake bitcoin fraud
  16. Google Services down due to BGP leak, traffic hijacked through Russia, China, and Nigeria
  17. To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords
  18. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  19. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  20. Illegal cryptocurrency mining
  21. Leak: Windows 10 October Update will be re-launched tomorrow
  22. Twitter grapples with fake Elon Musk accounts promoting bitcoin scams

FOOD

Nil

WATER

  1. That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards

ENERGY

  1. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  2. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  3. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  4. Illegal cryptocurrency mining

GOVERNMENT & PUBLIC SERVICE

  1. Scare Force: Pakistan military hit by Operation Shaheen malware
  2. Pakistan Military Hit By Operation Shaheen Malware
  3. Sophisticated cyber-espionage campaign targeting Pakistani government and air force
  4. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  5. It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
  6. Using Machine Learning to Cluster Malicious Network Flows From Gh0st RAT Variants
  7. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  8. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency