Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • September 11 Attacks

    • On September 11, 2001, 19 militants associated with the Islamic extremist group al Qaeda hijacked four airplanes and carried out suicide attacks against targets in the United States.
    • Two of the planes were flown into the twin towers of the World Trade Center in New York City, a third plane hit the Pentagon just outside Washington, D.C., and the fourth plane crashed in a field in Shanksville, Pennsylvania. Almost 3,000 people were killed during the 9/11 terrorist attacks, which triggered major U.S. initiatives to combat terrorism and defined the presidency of George W. Bush.
    History Channel
    hak-iq.us20.list-manage.comSeptember 10, 2020
  • 9/11 FAQs

    • Find answers to frequently asked questions about the 9/11 Memorial & Museum and the events of September 11, 2001.
    9/11 Memorial
    hak-iq.us20.list-manage.comSeptember 10, 2020
  • Ransomware: Huge rise in attacks this year as cyber criminals hunt bigger pay days

    • There's been a huge increase in the number of ransomware attacks over the course of 2020, with a seven-fold rise in campaigns compared with just last year alone, according to newly released data from cybersecurity researchers.
    • In many cases, hackers are following through with threats to leak data they've stolen in the run-up to deploying the ransomware attack if the victim doesn't pay – something that might strike fear into future victims and encourage them to give into the extortion demands more quickly.
    - Danny Palmer | September 9, 2020
    hak-iq.us20.list-manage.comSeptember 9, 2020
  • Iranian Hackers Launch Dharma Ransomware Attack on Global Firms

    • Iranian cybercriminals have been perpetrating ransomware attacks on victims, using “Dharma Ransomware” and a combination of publicly available hacking tools. They have been mainly targeting companies headquartered in Russia, Japan, China, and India.
    • The ransomware is infamously known as Crysis, which has been sold or distributed as a RaaS (ransomware-as-a-service) model since the year 2016.
    • It appeared to researchers that criminals did not have a well-defined plan of action regarding what to do with the networks they had infiltrated. After establishing RDP connections, the hackers determined the tools to be used to move ahead with the attack.
    • They took the help of Defender Control and Your Uninstaller to disable the pre-existent antivirus software present in the victim’s system.
    - Ahona Rudra | September 9, 2020
    hak-iq.us20.list-manage.comSeptember 9, 2020
  • Newcastle University students' data held to ransom by cyber criminals

    • Newcastle University is being held to ransom by cyber criminals in an attack which has been disrupting IT systems since the beginning of the month.
    • The cyber crime group behind the attack - known as DoppelPaymer - previously leaked documents online relating to Elon Musk's companies SpaceX and Tesla.
    • Newcastle University did not respond to Sky News' enquiries about whether it would pay the ransom to protect staff and students' personal data from being leaked online.
    - Alexander Martin | September 8, 2020
    hak-iq.us20.list-manage.comSeptember 8, 2020
  • Permanent Mobile And Remote Security For Workers Is An Organization's Duty

    • As the spread of the virus persists and organizations realize that teleworking offers strong advantages for employers as well as employees, what appeared to be a temporary adjustment made on the fly is becoming a more prominent — and in some cases permanent — part of operations.
    • Companies may need to make some adjustments while enacting their business continuity and continuity of operations (COOP) plans in the current Covid-19 environment.
    • Many of those plans were originally intended as short-term responses to sudden emergencies, and they often were built on the presumption that most employees would still be getting together in a shared space of some kind, such as a secondary office site.
    • In some cases, the adjustments may involve processes such as ensuring end-to-end digital steps that include an on-premises paper-based stage.
    - Jonas Gyllensvaan | September 8, 2020
    hak-iq.us20.list-manage.comSeptember 8, 2020
  • Your work laptop may not be as secure as it should be

    • With more employees than ever working from home, making sure that devices connected to the corporate network are secure has become a key priority for businesses.
    • Or so they claim: according to Kaspersky, 23% of desktops and 17% of laptops supplied by UK employers have no antivirus or cybersecurity software installed.
    • Companies have scrambled to implement internal controls and safeguards in the meantime, with IT leaders shifting their focus to fostering cybersecurity-savvy cultures in the workplace and a renewed focus on protecting critical capabilities and services.
    - Owen Hughes | September 8, 2020
    hak-iq.us20.list-manage.comSeptember 8, 2020
  • Botnets: A cheat sheet for business users and security admins

    • Botnets are used to do all sorts of malicious things, like launch distributed denial of service (DDoS) attacks, spread malware, and mine cryptocurrency--all without the device's owner being aware that it's been hijacked.
    • That doesn't mean there aren't signs that an internet-connected device has been hijacked, and botnet victims aren't beyond saving.
    • The most common use of malicious botnets is to launch DDoS attacks that knock down websites, DNS providers, and other internet services.
    • DDoS attacks rely on massive amounts of traffic that paralyze a provider, making it impossible for legitimate traffic to reach it before eventually knocking it offline.
    - Brandon Vigliarolo | September 7, 2020
    hak-iq.us20.list-manage.comSeptember 7, 2020
  • SMB Cybersecurity Catching Up to Enterprise… But the Human Element Still a Major Concern

    • Some believe hackers are aggressively targeting smaller firms because they believe SMBs lack adequate resources and enterprise-grade security tools, making them easier prey than larger businesses.
    • Yet even with improved technology to reduce threats, the human factor is still a significant concern; one single misstep by an employee can cause a breach that leads to a major security incident.
    • To achieve a truly effective security posture, SMBs must put systems in place to minimize human error that can turn an unintentional mistake into a security disaster.
    | September 7, 2020
    hak-iq.us20.list-manage.comSeptember 7, 2020
  • The State Of Identity Security, 2020

    • Identities are the fastest growing and most vulnerable threat surface every organization has.
    • Enterprise IT and cybersecurity leaders are most confident they can stop a breach attempt based on privileged user access credentials – and least confident about stopping machine-to-machine and IoT-originated breaches.
    - Louis Columbus | September 6, 2020
    hak-iq.us20.list-manage.comSeptember 6, 2020