Cybersecurity News
‘Copyright Violation’ Notices Lead to Facebook 2FA Bypass
Fraudulent Facebook messages allege copyright infringement and threaten to take down pages, unless users enter logins, passwords and 2FA codes.28 October 2020
6 Ways Passwords Fail Basic Security Tests
New data shows humans still struggle with password creation and management.28 October 2020
Rethinking Security for the Next Normal -- Under Pressure
By making a commitment to a unified approach to security, then doing what's necessary to operationalize it, organizations can establish a better security model for the next normal.28 October 2020
How the Pandemic is Reshaping the Bug-Bounty Landscape
Bugcrowd Founder Casey Ellis talks about COVID-19's impact on bug bounty hunters, bug bounty program adoption and more.28 October 2020
Russian Espionage Group Updates Custom Malware Suite
Turla has outfitted a trio of backdoors with new C2 tricks and increased interop, as seen in an attack on a European government.28 October 2020
Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo
In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it emerged that the intruders stole and published online tens of thousands of sensitive documents -- including schematics of client bank vaults and surveillance systems. The Gunnebo Group is a Swedish multinational company that provides physical security to a variety of clients globally, including banks, government agencies, airports, casinos, jewelry stores, tax agencies and even nuclear power plants. The company has operations in 25 countries, more than 4,000 employees, and billions in revenue annually.28 October 2020
Trump Campaign Website Defaced by Unknown Attackers
Individuals behind the brief Tuesday night incident posted anti-Trump sentiments and appeared to solicit cryptocurrency.28 October 2020
Tracking Down the Web Trackers
Third-party Web trackers might be following your website visitors' every step. How can new tools like Blacklight help you stop them in their tracks?28 October 2020
How to Increase Voter Turnout & Reduce Fraud
Digital identity verification has advanced, both technologically and legislatively. Is it the answer to simpler, safer voting?28 October 2020
Iran-linked APT Targets T20 Summit, Munich Security Conference Attendees
The Phosphorous APT has launched successful attacks against world leaders who are attending the Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia, Microsoft warns.28 October 2020
Physical Security Has a Lot of Catching Up to Do
The transformation we need: merging the network operations center with the physical security operations center.28 October 2020
Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote
With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications.28 October 2020
ESET Threat Report Q3 2020
A view of the Q3 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The post ESET Threat Report Q3 2020 appeared first on WeLiveSecurity
28 October 2020
North Korea-Backed Spy Group Poses as Reporters in Spearphishing Attacks, Feds Warn
The Kimsuky/Hidden Cobra APT is going after the commercial sector, according to CISA.28 October 2020
Experts Weigh in on E-Commerce Security Amid Snowballing Threats
How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike.28 October 2020
Trump Campaign Website Defaced by Cryptocurrency Scam
Hackers claim to have access to classified information linking the president to the origin of the coronavirus and criminal collusion with foreign actors.28 October 2020
Survey Uncovers High Level of Concern Over Firewalls
More than half of respondents are planning to reduce their network firewall footprint because of what they see as limitations in the technology.27 October 2020
Lax Security Exposes Smart-Irrigation Systems to Attack Across the Globe
Systems designed by Mottech Water Management were misconfigured and put in place and connected to the internet without password protections.27 October 2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Following the NSA's list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how they're used around the world.27 October 2020
Amazon Fires Employee Who Leaked Customer Names, Emails
Amazon notified customers and law enforcement of the insider-threat incident this week.27 October 2020