Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • NETFLIX AND YOUTUBE USERS WARNED ABOUT MASSIVE RISE IN DATA SCAMS

    • Hackers have increased their attacks against streaming companies, as research has shown that phishing URLs which include Netflix, HBO, YouTube, and Twitch has risen dramatically.
    • To defend against these kinds of attacks, individuals should undertake security awareness training and remain vigilant in scrutinising the types of emails they receive.
    • This should also be underpinned by cybersecurity technology such as email filtering, anti-virus protection, and strong password policies.
    - Adam Smith | August 10, 2020
    hak-iq.us20.list-manage.comAugust 10, 2020
  • Belarus shuts down internet as thousands protest election results

    • A loudspeaker on a stage in Minsk plays Viktor Tsoi‘s “Change,” as a man in a suit tries frantically to pull out the power cable.
    • That anthem is being sung by Belarusians enraged at an attempt by longtime president Alexander Lukashenka to win a sixth consecutive term.
    • Since Lukashenka took office in 1994, the country has never held a free and fair election — the latest vote, and the run-up to it, appeared to continue that trend.
    - Maxim Edwards | August 10, 2020
    hak-iq.us20.list-manage.comAugust 10, 2020
  • FBI says an Iranian hacking group is attacking F5 networking devices

    • A group of elite hackers associated with the Iranian government has been detected attacking the US private and government sector.
    • Once the hackers gain access to a device, they install a web shell or backdoor, transforming the equipment into a gateway into the hacked network.
    - Catalin Cimpanu | August 10, 2020
    hak-iq.us20.list-manage.comAugust 10, 2020
  • Improving network security by ‘deflecting’ cybercriminals

    • Once inside a network, cybercriminals can lurk for long periods, quietly moving around and assessing what data is available and what it might be worth.
    • This activity can often continue without triggering alarms or providing warnings to the security team.
    • Overcoming this situation means using a new technique that makes it significantly easier to spot cybercriminals who have successfully entered a network.
    • It allows security teams to identify the threat and then take steps to remove it and minimise any damage or loss.
    | August 10, 2020
    hak-iq.us20.list-manage.comAugust 10, 2020
  • AI Experts Rank Deepfakes and 19 Other AI-Based Crimes By Danger Level

    • A new report published by University College London aimed to identify the many different ways that AI could potentially assist criminals over the next 15 years.
    • The report had 31 different AI experts take 20 different methods of using AI to carry out crimes and rank these methods based on various factors.
    • According to the results of the report, Deepfakes posed the greatest threat to law-abiding citizens and society generally, as their potential for exploitation by criminals and terrorists is high.
    • The AI experts ranked deepfakes at the top of the list of potential AI threats because deepfakes are difficult to identify and counteract.
    - Daniel Nelson | August 9, 2020
    hak-iq.us20.list-manage.comAugust 9, 2020
  • Misconfigurations affect 93% of cloud deployments

    • A review of "hundreds" of cloud deployments from customers and community showed 93% of reviewed infrastructure had misconfigured cloud storage services.
    • The impact of misconfigurations in enterprise cloud deployments can potentially spread beyond organizations and reach their clients and stakeholders.
    • These type of cybersecurity flaws led to one of the largest data breaches the financial sector saw last year: the Capital One breach. A firewall misconfiguration allowed a malicious actor reach company data, which was hosted on Amazon Web Services.
    - Roberto Torres | August 5, 2020
    hak-iq.us20.list-manage.comAugust 5, 2020
  • What is Vishing? Voice Phishing Scams to Avoid

    • Vishing is a phone scam type of phishing attack.
    • In a vishing attack, a scammer uses a phone call to target their victims and steal information, money, or both.
    • Vishing can also be a type of social engineering scam — that is, the criminal uses specific or “vague enough to be real” details about the victim to get them to believe the scam caller is real and should be trusted.
    BUSINESS 2 COMMUNITY - Steve Turner | August 5, 2020
    hak-iq.us20.list-manage.comAugust 5, 2020
  • Are your remote employees enforcing cyber security?

    • Studies shows that since the coronavirus outbreak, phishing attacks increased by 40%.
    • Working remotely comes with its own challenges for organisations, such as employees using personal laptops to access work materials.
    • While others might use their work machines to access personal applications, download materials from untrusted sites, or use USBs that have malware, which then creates attack vectors and additional vulnerabilities that could lead to a data breach.
    • Businesses should align their cybersecurity goals with business priorities, evaluate the effectiveness of their cybersecurity and Identify and protect the most valuable processes and information assets.
    MSN News | August 4, 2020
    hak-iq.us20.list-manage.comAugust 4, 2020
  • Hiring! SecOps engineers in demand as firms embark on cloud journey

    • SecOps, Security Operations, is the buzzword in the IT world now, especially after the outbreak of COVID-19.
    • Security Operations engineer works on the security and performance of network infrastructure. This means he should have knowledge about both cybersecurity and cloud architecture.
    • Apart from shielding networks from potential vulnerabilities such as ransomware attack or phishing, they should know social engineering aspects as well.
    MSN - Swathi Moorthy | August 3, 2020
    hak-iq.us20.list-manage.comAugust 3, 2020
  • SIM Swapping: Why Telcoms Need To Adopt Stronger Identity Proofing Methods

    • A growing threat, SIM swapping occurs when a cybercriminal calls a wireless network provider and tells them a legitimate user’s phone was lost or stolen.
    • They then ask the provider to activate a new SIM card connected to the legitimate user’s phone number on a phone owned by the fraudster.
    • If successful, fraudsters will then receive the real user’s text messages, calls and data to the newly activated device under their control.
    - Robert Prigge | August 3, 2020
    hak-iq.us20.list-manage.comAugust 3, 2020