Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Protecting your identity amidst growing digital disorder

    • Once a cybercriminal has someone’s authentication credentials, they have the tools to unlock their victim’s entire digital identity.
    • Arming yourself with the right tools is a great first step in protecting your digital identity, but it’s also important to stay educated on the latest developments.
    • Major data breaches are always covered in the news, so this is often a good place to keep a pulse on any attacks that could have compromised your personal information.
    techradar.pro - Nic Sarginson | August 13, 2020
    hak-iq.us20.list-manage.comAugust 13, 2020
  • Hacker leaks data for U.S. gun exchange site on cybercrime forum

    • On August 10th, a threat actor posted databases that they claim contain 195,000 user records for the utahgunexchange.com, 45,000 records for their video site, 15,000 records from the hunting site muleyfreak.com, and 24,000 user records from the Kratom site deepjunglekratom.com.
    • All of these sites are based out of Utah, USA and samples of the databases shared by cybersecurity intelligence firm Cyble show that each database was hosted on the same Amazon AWS server.
    BLEEPING COMPUTER - Lawrence Abrams | August 13, 2020
    hak-iq.us20.list-manage.comAugust 13, 2020
  • Incident Of The Week: Garmin Pays $10 Million To Ransomware Hackers Who Rendered Systems Useless

    • On July 23, Garmin users went to Twitter to express their concern over inaccessible website features.
    • Four days later, Garmin released an official statement confirming that a cyber attack had taken place. Garmin assured its users that no PII (personal identifying information) was compromised.
    • Garmin may be just the beginning of a new ransomware era that specifically targets large U.S. corporations.
    CYBER SECURITY HUB - Seth Adler | August 13, 2020
    hak-iq.us20.list-manage.comAugust 13, 2020
  • Israel says it thwarted foreign cyber attack on defence industry

    • Israel’s Defence Ministry said hackers posing as potential employers sent job offers to defence workers trying to infiltrate their networks and gather sensitive information.
    • The group built fake profiles on the LinkedIn network to disguise its hackers and separately attempted to hack Israeli defence firms via their websites
    - Rami Ayyub | August 12, 2020
    hak-iq.us20.list-manage.comAugust 12, 2020
  • Mobile Phishing, the Next Battleground

    • With the rising popularity of iOS and Android devices for everything from sending a client an SMS to attending a Zoom call, it was only a matter of time before cybercriminals seized the opportunity to target users through the least protected and most popular communication medium, mobile.
    • Most phishing vendors have not kept pace with the innovations made by cybercriminals in the mobile space and are still focused on email-based phishing.
    • With the lack of built-in phishing protection within iOS and Android, Mobile users are left with no choice but to rely on their security awareness training to dodge these phishing attacks.
    - Atif Mushtaq | August 12, 2020
    hak-iq.us20.list-manage.comAugust 12, 2020
  • Pace Center for Girls' Donor Data Breached

    • Pace Center for Girls has issued a warning to its supporters after the organization discovered some of its data had been affected by a May security breach at Blackbaud.
    • Pace is one of the more than 200 organizations that have been impacted by the Blackbaud security incident.
    • Other victims include the Boy Scouts of America, the National Trust, and more than ten universities in the UK, US, and Australia. 
    - Sarah Coble | August 12, 2020
    hak-iq.us20.list-manage.comAugust 12, 2020
  • TikTok Was Secretly Collecting Data On Its Android App That Violated Google Protocol

    • With TikTok currently fighting against an executive order ban in the U.S. by the Trump Administration, it now appears the popular app has come under even more scrutiny for collecting MAC addresses without user's consent.
    • We constantly update our app to keep up with evolving security challenges, and the current version of TikTok does not collect MAC addresses.
    • "We have never given any U.S. user data to the Chinese government nor would we do so if asked.” - TikTok
    - Keenan Higgins | August 11, 2020
    hak-iq.us20.list-manage.comAugust 11, 2020
  • Security Challenges for Healthcare Providers

    • As healthcare organizations transition to electronic record keeping and deploy more online services, health records are increasingly vulnerable to digital theft.
    • Healthcare records are highly valuable to cybercriminals because of the types of data they contain, including insurance information, payment details, addresses, etc.
    • Everything that a cybercriminal requires to obtain a bank loan, commit tax fraud or send fake bills to insurance companies is contained in medical records.
    - Radware | August 11, 2020
    hak-iq.us20.list-manage.comAugust 11, 2020
  • SANS infosec training org suffers data breach after phishing attack

    • The SANS cybersecurity training organization has suffered a data breach after one of their employees fell victim to a phishing attack.
    • SANS states that their digital forensics instructions are heading up the investigation and are working to make sure no other systems are compromised and harden their existing systems and security.
    • As an educational opportunity, SANS states that they will host a webcast that includes information about this incident that would be useful to the greater security community.
    - Lawrence Abrams | August 11, 2020
    hak-iq.us20.list-manage.comAugust 11, 2020
  • Prepare for Slower Data Breach Detection, Higher Costs With Remote Workforce

    • One benefit of keeping company data on corporate-owned electronics and networks is the ease of monitoring for cyber intrusions or unusual activity.
    • Previously “you limit your investigation to within the business premises versus now having to look at the systems or other setups employees may have in their homes.
    • As potential data threats grow while employees continue to work from home, companies are also dealing with COVID-19′s economic impact on their business.
    - Victoria Hudgins | August 10, 2020
    hak-iq.us20.list-manage.comAugust 10, 2020