Threat report for 2018-11-15
DATA BREACH & DATA LOSS
- My Health Record extension highlights lingering security, privacy concerns
- Firefox Now Alerts You of Website Data Breaches While You're Browsing the Web
- Survey Says: Bad PR Due to Data Breach News, Very Bad for Businesses
- Firefox warns if the website you're visiting suffered a data breach
- 20% of MageCart-compromised merchants get reinfected within days
- 20% of MageCart-compromised merchants get reinfected within days
- Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
- Report: Microsoft’s enterprise products covertly gather personal data on users
- Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data
- A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
- Law firm uncovers exposed sensitive details about top attorney online. @mazzazone gives the details:
- #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
- Nordstrom is notifying employees of a data breach that exposed their personal information, including names, Social Security numbers, dates of
- Data breach at Nordstrom
- My Health Record remains opt-out as Senate passes privacy amendments
- Symantec Honored for its Collaboration With Leading Industry Group to Protect Against Business Email Compromise Scams
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- G Suite Adds Advanced Password Controls
- Man Sends Bomb to Cryptopay for Denying a Password Change Request
- Phishing Attack Causes Breach at Southwest Washington Regional Surgery Center
- 5 Ways #Cybercriminals Can Access Your Emails Without #Phishing [Infographic]:
- Phishing Emails with .COM Extensions Are Hitting Finance Departments
- Today #GroupIB detected a massive phishing campaign sent to Russian banks from a fake email address purporting to belong to
- A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
- Phishing fraudsters set their sights on online storage portals
- 'DarkGate' miner, password-stealer could open up world of hurt for Windows users
- Learn why @Google chose U2F authentication over OTP to eliminate #PhishingEmails from expert Michael Cobb of @thehairyITdog.
- Vade Secure launches IsItPhishing Threat Detection to help SOCs identify phishing URLs
- Smashing Security #104: The world’s most evil phishing test, and cyborgs in the workplace
WEB DEFACEMENT
Nil
BOTNET
- Deep Instinct recently blogged about a new #botnet -- dubbed #Mylobot -- that has shown new, complex tools and techniques.
- Bots on a plane? Bad bots cause unique cyber-security issues for airlines
RANSOMWARE
- Should Windows Users Worry About Ransomware in 2019?
- 500 Percent Increase in macOS/iOS Ransomware Attacks During 1H 2018
- Ransomware Continues to Be Top Threat to Small Companies
- Ransomware Attack Strikes Media Prima
CRYPTOMINING & CRYPTOCURRENCIES
- Linux Based Crypto-Mining Malware
- Official Google Twitter account hacked in Bitcoin scam
- A #phishing campaign was recently found to be hijacking the traffic of @Trezor user #cryptocurrency wallets. Learn how such an
- How is the Trezor cryptocurrency online wallet under attack?
- Cryptocurrency fraud is the exception, not the rule
- Fake cryptocurrency Wallets Apps on Google Play Steal User Credentials and Mimic as Legitimate Wallets
- Access Control Acronyms: ACL, RBAC, ABAC, PBAC, RAdAC, and a Dash of CBAC
- Cryptowerk introduces blockchain-based technology to certify data integrity of digital assets
- The ABC of the Hong Kong tech scene: A - AI, B - blockchain, C - cloud
MALWARE
- Proofpoint: Hackers testing new reconnaissance malware on financial institutions
- A RAT Just Made It in the Global Threat Index’s Top 10
- Ahead of Black Friday, Rash of Malware Families Takes Aim at Holiday Shoppers
- Cyber Crooks Diversify Business with Multi-Intent Malware
- Linux Based Crypto-Mining Malware
- Cloud, China, Generic Malware Top Security Concerns for 2019
- Brazilian Users Under Attack From Metamorfo Banking Trojan
- #WebCache poisoning poses a serious threat to #BrowserSecurity. Learn how #hackers can use unkeyed inputs for malicious intent from expert
- 14 Malware Families Targeting E-Commerce Brands Ahead of Black Friday
- #tRat: New modular #RAT appears in multiple email campaigns: http://ow.ly/1nsX50jHzgd via the Proofpoint @threatinsight research team.
- Carpet (IT) to Concrete (OT) – The Evolution of Internet-Based Malware
- Creating and Analyzing a Malicious PDF File with PDF-Parser Tool
- I forgot to follow up on this… According to Apple, the process could take up to 7 days. It
EXPLOIT
- Fresh exploit takes the shackles off disabled PHP functions
- What is the impact of cyber espionage? @MikaSusiEK from Confederation of Finnish Industries EK discusses, how to tackle the growing
VULNERABILITY
- Vulnerability: Emojis can kill Skype for Business
- IRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk
- Unpatched Microsoft Word Video Feature Vulnerability is Being Exploited In The Wild
- 7 New Meltdown and Spectre Level Vulnerabilities Discovered that Affected ARM, Intel & AMD CPU’s
- Two whitehats receive $60,000 in rewards for successfully finding iOS 12.1 vulnerabilities
- VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert
- Cisco Stealthwatch Management Console and Unity Express Critical Vulnerabilities Threat Alert
- Popular AMP Plugin for WordPress Patches Critical Flaw – Update Now
- Is Your Vulnerability Management Program Efficient and Successful?
- Find vulnerabilities using nikto
- Facebook fixed a new security bug
- 63 new vulnerabilities found in Windows