13 Dec 2019

Why Ring Doorbells Perfectly Exemplify the IoT Security Crisis

Recently, there has been an influx of concerning news about how Amazon stores video surveillance data from its Ring smart doorbell systems, sparking concern among consumers and experts alike. This week, reports that hackers are breaking into users’ Ring accounts have emerged. When the hacker obtains access to the Ring

Read More
12 Dec 2019

Analysts find connection between North Korean military and crimeware organization TrickBot

Analysts at SentinelLabs claim to have found some of the first evidence that links the crimeware organization TrickBot and Lazarus group. Lazarus group is the cyberwarfare division of the North Korean military’s Reconnaissance General Bureau. TrickBot debuted as a banking malware in the fall of 2016 and has since evolved

Read More
12 Dec 2019

Hackers allegedly emptied brokerage accounts with a simple email scam — here’s how to protect yourself

In November, prosecutors in New York stated that a Lithuanian man named Vytautas Parfionovas and an unknown co-conspirator emptied the brokerage accounts of several victims, ultimately stealing hundreds of thousands of dollars. The cybercrimes occurred over eight years, starting in 2011, and consisted of the two perpetrators tricking day traders

Read More
11 Dec 2019

Data Leak Week: Billions of Sensitive Files Exposed Online

Earlier this week, separate data exposure incidents left a total of 2.7 billion email addresses, 1 billion passwords, and nearly 800,000 applications for copies of birth certificates were found on unsecured cloud buckets by security researcher Bob Diachenko. Organizations continue to fail to lock down their cloud servers, and researchers

Read More
11 Dec 2019

Blink Cameras Found with Multiple Vulnerabilities

Researchers at the company Tenable found three broad types of vulnerabilities in Amazon’s popular home security cameras, Blink. The three vulnerabilities include one that is not practical, one that is interesting to researchers, and one that poses a threat to customers. According to researchers, the Blink camera’s design makes it

Read More
10 Dec 2019

Maersk CISO Says NotPeyta Devastated Several Unnamed US firms

Maersk Chief Information Security Officer Andrew Powell stated at Black Hat Europe 2019 that he believes that 600 countries across the globe were damaged by NotPetya around the time of the Maersk attack. He stated that any company doing business in Ukraine at the time of the attack was hit.

Read More
10 Dec 2019

Reddit: US-UK NHS ‘Sale’ Docs Leaked by Russia

Reddit announced that it has banned 61 accounts and one subreddit after post-Brexit US-UK trade deal documents were leaked on the platform as part of a Russian influence campaign. Reddit launched an investigation into the leaked documents and found that the users posting the documents may be associated with a

Read More
06 Dec 2019

New ransomware attacks target your NAS devices, backup storage

Researchers state that users are unprepared for the threat that ransomware strains targeting NAS and backup storage pose. As these ransomware strains grow in popularity, hospitals, commercial enterprises, and individuals are targeted. Once malware is deployed on a system, it typically encrypts files and demands payment through a ransom note

Read More
06 Dec 2019

VPN Flaw Allows Criminal Access to Everything on Victims’ Computers

A VPN vulnerability in the Aviatrix VPN client has been patched, but previously gave an attacker unlimited access to the targeted device. Aviatrix VPN client is used by large US organizations, notably NASA and Shell. All versions of the VPN have been patched and are now available for download without

Read More
05 Dec 2019

The Great Cannon DDoS Tool Used Against Hong Kong Protestors’ Forum

The Great Cannon Distributed Denial of Service (DDoS0 tool was deployed against the LIHKG platform used by Hong Kong protesters to coordinate. The Great Cannon is a tool that hijacks traffic between IP addressed, resulting in the ability to replace unencrypted content using man-in-the-middle techniques. The Great Cannon is currently

Read More