Cybersecurity News
Researchers: Booming Cyber-Underground Market for Initial-Access Brokers
Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from 'vendors' that have previously installed backdoors on targets.16 June 2021
Peloton Bike+ Bug Gives Hackers Complete Control
An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.16 June 2021
OSINT 101: What is open source intelligence and how is it used?
OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers
The post OSINT 101: What is open source intelligence and how is it used? appeared first on WeLiveSecurity
16 June 2021
Facebook awards $30,000 bounty for exploit exposing private Instagram content
The bug allowed users to view content without following an account.16 June 2021
SEC settles with First American over massive leak of mortgage data, disclosure
First American has agreed to a penalty of close to half a million dollars.16 June 2021
Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet
Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.15 June 2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.15 June 2021
Security Experts Scrutinize Apple, Amazon IoT Networks
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.15 June 2021
Millions of Connected Cameras Open to Eavesdropping
A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability.15 June 2021
Andariel Group Targets South Korean Entities in New Campaign
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.15 June 2021
Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.15 June 2021
Malicious PDFs Flood the Web, Lead to Password-Snarfing
SolarMarker makers are using SEO poisoning, stuffing thousands of PDFs with tens of thousands of pages full of SEO keywords & links to redirect to the malware.15 June 2021
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.15 June 2021
Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign
Varied cloud infrastructure was used to phish email credentials, monitor for and forward finance-related messages and automate operations.15 June 2021
Microsoft takes down large‑scale BEC operation
The fraudsters ran their campaigns from the cloud and used phishing and email forwarding rules to steal their targets' financial information.
The post Microsoft takes down large‑scale BEC operation appeared first on WeLiveSecurity
15 June 2021
How President Biden Can Better Defend the US From Russian Hacks
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.15 June 2021
How Does One Get Hired by a Top Cybercrime Gang?
The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot, a malware-as-a-service platform responsible for infecting millions of computers and seeding many of those systems with ransomware. Just how did a self-employed web site designer and mother of two come to work for one of the world’s most rapacious cybercriminal groups and then leave such an obvious trail of clues indicating her involvement with the gang? This post explores answers to those questions, as well as some of the ways Trickbot and other organized cybercrime gangs gradually recruit, groom and trust new programmers.15 June 2021
Insider Risks In the Work-From-Home World
Forcepoint’s Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk, particularly with pandemic-expanded network perimeters.15 June 2021
SASE & Zero Trust: The Dream Team
Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust real.15 June 2021
How Does the Government Buy Its Cybersecurity?
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.15 June 2021