Nov 18, 2018

APT report for 2018-11-17

TRANSNATIONAL / UNKNOWN

Nil

CHINA

Nil

INDIA

Nil

NORTH KOREA

  1. 8 Cybersecurity Prediction for 2019

PAKISTAN

Nil

VIETNAM

Nil

IRAN

  1. News of the Week: November 17, 2018
  2. BlackBerry absorbs Operation Cleaver beaver Cylance into threat detection unit

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

Nil

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-11-17

WINDOWS

  1. 4 Effective Ways on How to Prevent Cryptocurrency Mining Infection
  2. 8 Cybersecurity Prediction for 2019
  3. Windows 10 October Update Brings Back Old Mapped Drives Bug

LINUX

  1. 8 Cybersecurity Prediction for 2019

UNIX

Nil

ANDROID

  1. 8 Cybersecurity Prediction for 2019

IOS

  1. 8 Cybersecurity Prediction for 2019

MACOS

  1. 8 Cybersecurity Prediction for 2019

Threat report for 2018-11-17

DATA BREACH & DATA LOSS

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB
  2. Amarillo City Workers PII Compromised
  3. The @Trezor #cryptocurrency wallet service was recently targeted in a #phishing campaign against users. Learn how traffic was hijacked and
  4. 'Unjustifiably excessive': Not even London cops can follow law with their rubbish gang database
  5. Despite early speculation, experts concluded the BGP route leak that sent Google traffic through China and Russia was due to

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB
  2. The @Trezor #cryptocurrency wallet service was recently targeted in a #phishing campaign against users. Learn how traffic was hijacked and
  3. SPOILER: These are not good password tricks.

WEB DEFACEMENT

Nil

BOTNET

  1. Discover how a new #botnet -- dubbed #Mylobot -- is altering the botnet attacks with expert @lewisnic

RANSOMWARE

  1. GandCrab Ransomware: Cat-and-Mouse Game Continues

CRYPTOMINING & CRYPTOCURRENCIES

  1. 4 Effective Ways on How to Prevent Cryptocurrency Mining Infection
  2. The @Trezor #cryptocurrency wallet service was recently targeted in a #phishing campaign against users. Learn how traffic was hijacked and
  3. Misconfigurations on Docker services allow cryptojacking attacks

MALWARE

  1. #Cyberespionage hackers have used stolen #DigitalCertificates to steal data. Expert Michael Cobb of @thehairyITdog explains how hackers sign Plead
  2. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread

EXPLOIT

Nil

VULNERABILITY

  1. Children’s Smartwatch Vulnerability Allows Hackers To Stalk and Talk To Your Kids
  2. Windows 10 October Update Brings Back Old Mapped Drives Bug

Region brief for 2018-11-17

ASIA

  1. 8 Cybersecurity Prediction for 2019
  2. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread
  3. Despite early speculation, experts concluded the BGP route leak that sent Google traffic through China and Russia was due to

OCEANIA

  1. News of the Week: November 17, 2018

NORTH AMERICA

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB
  2. 8 Cybersecurity Prediction for 2019
  3. News of the Week: November 17, 2018
  4. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread

SOUTH AMERICA

Nil

EUROPE

  1. News of the Week: November 17, 2018
  2. 'Unjustifiably excessive': Not even London cops can follow law with their rubbish gang database
  3. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread
  4. Despite early speculation, experts concluded the BGP route leak that sent Google traffic through China and Russia was due to

AFRICA

  1. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread

Sector brief for 2018-11-17

HEALTHCARE

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB

TRANSPORT

Nil

BANKING & FINANCE

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB
  2. 4 Effective Ways on How to Prevent Cryptocurrency Mining Infection
  3. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread

INFORMATION & TELECOMMUNICATION

  1. 4 Effective Ways on How to Prevent Cryptocurrency Mining Infection
  2. SPOILER: These are not good password tricks.

FOOD

Nil

WATER

Nil

ENERGY

Nil

GOVERNMENT & PUBLIC SERVICE

  1. 8 Cybersecurity Prediction for 2019

Daily brief for 2018-11-17

ASIA

  1. 8 Cybersecurity Prediction for 2019
  2. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread
  3. Despite early speculation, experts concluded the BGP route leak that sent Google traffic through China and Russia was due to

WORLD

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB
  2. 8 Cybersecurity Prediction for 2019
  3. News of the Week: November 17, 2018
  4. 'Unjustifiably excessive': Not even London cops can follow law with their rubbish gang database
  5. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread
  6. Despite early speculation, experts concluded the BGP route leak that sent Google traffic through China and Russia was due to

ATTACKS

  1. Million password resets and 2FA codes exposed in unsecured Vovox DB
  2. Amarillo City Workers PII Compromised
  3. The @Trezor #cryptocurrency wallet service was recently targeted in a #phishing campaign against users. Learn how traffic was hijacked and
  4. 'Unjustifiably excessive': Not even London cops can follow law with their rubbish gang database
  5. SPOILER: These are not good password tricks.
  6. Despite early speculation, experts concluded the BGP route leak that sent Google traffic through China and Russia was due to

THREATS

  1. 4 Effective Ways on How to Prevent Cryptocurrency Mining Infection
  2. Children’s Smartwatch Vulnerability Allows Hackers To Stalk and Talk To Your Kids
  3. Windows 10 October Update Brings Back Old Mapped Drives Bug
  4. The @Trezor #cryptocurrency wallet service was recently targeted in a #phishing campaign against users. Learn how traffic was hijacked and
  5. GandCrab Ransomware: Cat-and-Mouse Game Continues
  6. #Cyberespionage hackers have used stolen #DigitalCertificates to steal data. Expert Michael Cobb of @thehairyITdog explains how hackers sign Plead
  7. Emotet Banking Trojan Family Re-emerges, Taps Malicious PDF/Doc Files to Spread
  8. Misconfigurations on Docker services allow cryptojacking attacks

CRIME

  1. 4 Effective Ways on How to Prevent Cryptocurrency Mining Infection
  2. 8 Cybersecurity Prediction for 2019
  3. #Cyberespionage hackers have used stolen #DigitalCertificates to steal data. Expert Michael Cobb of @thehairyITdog explains how hackers sign Plead

POLITICS

  1. 8 Cybersecurity Prediction for 2019
  2. #Cyberespionage hackers have used stolen #DigitalCertificates to steal data. Expert Michael Cobb of @thehairyITdog explains how hackers sign Plead