23 Apr 2019

Attackers are weaponizing more vulnerabilities than ever before

Threat actors are stepping up their efforts to weaponize vulnerabilities affecting Adobe products, new data by RiskSense shows. In 2018, a record-breaking 177 flaws were weaponized, which is 139% higher than in 2017. The study also found that last year almost three times more vulnerabilities were exploited in the wild before

Read More
23 Apr 2019

US could regard cyberattack on Japan as ‘armed attack,’ Pompeo says

US Secretary of State Mike Pompeo said that the US and Japan agree that Article 5 of the US-Japan Security Treaty, which obliges the countries to come to each other’s defense in case of an armed attack, could also be activated by a cyberattack because “international law applies in cyberspace

Read More
22 Apr 2019

Easter Attack Affects Half a Billion Apple iOS Users via Chrome Bug

A malvertising campaign launched last week takes advantage of an unpatched software vulnerability in the iOS version of Google Chrome, putting about half a billion users at risk. The threat actor behind the attack has been identified as the eGobbler gang, a cybercriminal group known for launching malvertising campaigns around

Read More
19 Apr 2019

FBI suspects Russians hacked ‘at least one’ Florida county, Mueller report says

Special counsel Robert Mueller’s report on Russia’s efforts to interfere in the 2016 US presidential election states that the FBI believes the Russian military intelligence agency (GRU) “gained access to the network of at least one Florida country government” in November of 2016. The GRU allegedly managed this feat by

Read More
19 Apr 2019

Report: Under-Resourced People Face Higher-Than-Average Cyber Risks

A new University of California study[pdf] shows that underserved people face higher cybersecurity risks than other citizens. The study defines underserved people as “residents from low-income households, foreign-born and foreign-language speakers, and seniors.” The survey found that underserved people are more likely to fall victim to cyber scams, to experience

Read More
19 Apr 2019

Hacker Group Exposes Iranian APT Operations and Members

Since the end of last month, a mysterious actor using the moniker Lab Dookhtegan has been leaking information on the state-backed Iranian hacking group APT34 (aka OilRig, HelixKitten) through a Telegram channel. The leaked information provides insights into the infrastructure of APT34, its members, the tools they use and the

Read More
19 Apr 2019

6 Takeaways from Ransomware Attacks in Q1

A new Coveware report based on data from the first quarter of 2019 highlights six interesting ransomware trends: Threat actors are demanding higher ransoms – the average ransom amount asked in incidents handled by Coveware was %12,762, a 89% increase over the last quarter of 2018, when the amount was $6,733.

Read More
19 Apr 2019

Weather Channel Knocked Off-Air in Dangerous Precedent

On Thursday morning, a “malicious software attack” on the network of US pay television channel The Weather Channel (TWC) forced the station to air 90 minutes of canned content instead of live footage, after which it restored its live broadcast “through backup mechanisms.” While the incident may not strike most

Read More
18 Apr 2019

A Government Hacks The Web’s Phone Book—And Erodes Trust In The Internet

Researchers with Cisco Talos are tracking a highly disturbing state-sponsored Domain Name System (DNS) hijacking campaign dubbed ‘Sea Turtle’ that has already targeted around 40 organizations across 13 countries, including government agencies and energy companies. Most targets are located in the Middle East and Northern Africa. The attack has the

Read More
18 Apr 2019

One hundred percent of endpoint security tools eventually fail

New research by Absolute indicates that on average, 2% of endpoint security tools within organizations fail each week and that all such solutions eventually fall short, leaving companies exposed to threats. More and more organizations are finally abandoning the traditional focus on security at the perimeter in favor of a

Read More