fbpx

Free tools and resources for Data Protection Officers!

Tag Archives for " hacking "

Cybersecurity in 2019

While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn’t put to rest.

Will 2019 be the year we see a nation-state take down a large-scale industrial installation? How much of the world’s cryptocurrency will be mined by hackers using unsuspecting endpoints? What kind of damage can we expect from well-intentioned but misguided vigilantes? And what does it all mean to you?

Full article: Cybersecurity in 2019: From IoT & Struts to Gray …

New malware pulls its instructions from code hidden in memes posted to Twitter

Security researchers said they’ve found a new kind of malware that takes its instructions from code hidden in memes posted to Twitter.

The malware itself is relatively underwhelming: like most primitive remote access trojans (RATs), the malware quietly infects a vulnerable computer, takes screenshots and pulls other data from the affected system and sends it back to the malware’s command and control server.

What’s interesting is how the malware uses Twitter as an unwilling conduit in communicating with its malicious mothership.

Full article: New malware pulls its instructions from code hidden in memes posted to Twitter | TechCrunch

Cyber attackers to use sophisticated tools against Cloud in 2019

Cyber attackers will use more sophisticated tools in 2019 to take advantage of the changing technology landscape and prey upon evolving corporate technology environments especially Cloud.

The attackers will leverage proven methods against growing Cloud adoption; more vulnerabilities will be found in Cloud infrastructure, such as containers, and weak Cloud security measures will allow greater exploitation of accounts for cryptocurrency mining.

Full article: Cyber attackers to use sophisticated tools against Cloud in 2019: Report- Technology News, Firstpost

Cyber crooks increasingly targeting home devices

Cyber criminals are shifting their attention from traditional computers to internet-connected devices in Canadian homes, says the government’s cyber security agency.

Enterprising cybercriminals have even infected devices connected to the internet with malware to mine cryptocurrency — with the owner of the device often being oblivious to what is going on.

Full article: Cyber crooks increasingly targeting home devices: report | CBC News

7 tips for CXOs to combat cybersecurity risks

This year alone saw more than 600 data breaches, yet only 25% of organizations are planning to defend against attacks, according to Deloitte. And only 25% of organizations are scenario-planning to defend against such attacks. Article provides seven tips to avoid and combat cybersecurity risks in 2019 and beyond.

Source: 7 tips for CXOs to combat cybersecurity risks in 2019 and beyond – TechRepublic

Risks from stolen Marriott data: espionage, ID theft, home burglaries

The data stolen from the Marriott hotel empire in a massive breach is so rich and specific it could be used for espionage, identity theft, reputational attacks and even home burglaries, security experts say.

Affected reservation system could be extremely enticing to nation-state spies interested in the travels of military and senior government officials.

Full article: Risks from stolen Marriott data: espionage, ID theft, home burglaries – East Bay Times

Marriott Hacking Exposes Data of Up to 500 Million Guests

Marriott International acknowledged on Friday that an “unauthorized party had copied and encrypted information” belonging to about 500 million customers on its Starwood reservations system.

The personal information of customers that was stolen includes names, dates of birth, passport numbers and payment numbers.

Full article: Marriott Hacking Exposes Data of Up to 500 Million Guests – The New York Times

Thefts, Hacks And Surveillance: Whose Side Is Blockchain On?

Crypto is in the news for the recent hacks and breaches, becoming the favorite currency of cybercriminals. This article examines what is actually going on, the fundamentals of security and what the crypto-community is actually doing to prevent hacks and surveillance.

Full article: Thefts, Hacks And Surveillance: Whose Side Is Blockchain On?

Stop focusing your information security efforts on the wrong things!

There once was a time not all that long ago when security teams could plead ignorant to IT security risks, with minimal possible consequence in terms of any significant damage coming to the company. Those days are long gone. In today’s era of advanced cyberattacks, information security is too important an element of business success to dismiss.

Full article: Stop focusing your information security efforts on the wrong things!

Widely used open source software contained bitcoin-stealing backdoor

A hacker or hackers sneaked a backdoor into a widely used open source code library with the aim of surreptitiously stealing funds stored in bitcoin wallets. The malicious code was inserted in two stages into event-stream, a code library with 2 million downloads that’s used by Fortune 500 companies and small startups alike.

In stage one, version 3.3.6, published on September 8, included a benign module known as flatmap-stream. Stage two was implemented on October 5 when flatmap-steam was updated to include malicious code that attempted to steal bitcoin wallets and transfer their balances to a server located in Kuala Lumpur. The backdoor came to light last Tuesday with this report from Github user Ayrton Sparling.

Full article: Widely used open source software contained bitcoin-stealing backdoor | Ars Technica

>