18 Feb 2019

Where’s the Equifax Data? Does It Matter?

According to a recent report by CNBC, the data on almost 150 million people that was compromised in the 2017 Equifax data breach has never been published or put for sale on the Dark Web, as usually happens when threat actors steal data for financial gain. Therefore, cyber security experts consider it very

Read More
15 Feb 2019

How Cyber Command’s plan to ‘frustrate’ hackers is working

According to a recent testimony by the head of U.S. Cyber Command before the Senate Armed Services Committee, the organization has been increasing its cyber operations across the globe with success, guided by the philosophy of ‘defending forward.’ “In practice, this means confronting our adversaries from where they launch cyberattacks and

Read More
15 Feb 2019

Increasing Involvement of Nation-states in Ransomware Attacks

New research by Recorded Future projects an increase of nation-state involvement in ransomware attacks. Researchers expect that ransomware attacks will be increasingly carried out by countries that are subject to harsh sanctions, such as North Korea, to generate revenue. Another possibility is the deployment of ransomware strains by state-backed hackers

Read More
15 Feb 2019

Iran indictments show even U.S. intelligence officials are vulnerable to basic hacking schemes

As the story broke about the charges against former U.S. Air Force intelligence specialist who defected to Iran and support targeted hacking against some of her former colleagues, one clear takeaway stood out: even U.S. intelligence officers can fall victim to basic, directed hacking campaigns. The process was simple; the

Read More
15 Feb 2019

Collection of 127 Million Stolen Accounts Up for Sale on the Dark Web

A threat actor using the moniker “gnosticplayers” has put two large collections of stolen data for sale on a dark web marketplace this week. The first batch contained 620 million records that were obtained by breaching 16 companies. Another batch of 127 million files was put up for sale a few days after

Read More
15 Feb 2019

Chinese company leaves Muslim-tracking facial recognition database exposed online

A Dutch security researcher who specializes in finding unsecured MongoDB databases on the Internet, recently made a disturbing discovery when he stumbled upon a database used by a Chinese firm to track facial recognition data on 2,56,5724 citizens of the Xinjiang province where the oppressed Uyghur Muslim minority is located. The data

Read More
15 Feb 2019

The year 2018 was the second most active year on record for data breaches, report says

According to a new report by Risk Based Security, 3.2% fewer data breaches took place in 2018 compared to the year before and the number of exposed records decreased 35.9%, from 7.9 billion in 2017 to 5 billion last year. However, the company said that not all data breaches from 2018 have

Read More
14 Feb 2019

What the Pentagon’s new AI strategy means for cybersecurity

On February 12, the US Department of Defense (DoD) released its new artificial intelligence (AI) strategy, which outlines plans for the integration of machine learning in the military’s defensive cyber operations. The strategy mentions that “in order to ensure DoD AI systems are safe, secure, and robust,” the pentagon “will fund

Read More
14 Feb 2019

Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues

The US government is charging a former US Air Force counterintelligence agent for conspiring with the Iranian Revolutionary Guard Corps (IRGC). According to the official indictment, Monica Elfriede Witt helped four Iranian hackers with the IRGC carry out social engineering attacks that targeted the suspect’s former colleagues in US intelligence. The aim

Read More
14 Feb 2019

Ukrainian official: Hacking intensifies as election nears

The head of Ukraine’s cyber-police, Serhii Demediuk, is warning that increased Russian hacking efforts are targeting the upcoming presidential elections in the country. He predicts that attacks will continue to be launched before, on and after March 31, election day, in an attempt to disrupt the voting itself as well as the subsequent

Read More