Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Answers To Today's Toughest Endpoint Security Questions In The Enterprise

    • Enterprises who are increasing the average number of endpoint security agents from 9.8 last year to 10.2 today aren't achieving the endpoint resilience they need because more software agents create more conflicts, leaving each endpoint exposed to a potential breach.
    • 1 in 3 enterprise devices is being used with a non-compliant VPN, further increasing the risk of a breach.
    • Bad actors are getting very good at finding the weakest links of an enterprises’ cyber defenses fast.
    • They’re able to look at the configuration of endpoints, see which software agents are installed, research known conflicts and exploit them to gain access to corporate networks.
    - Louis Columbus | August 2, 2020
    hak-iq.us20.list-manage.comAugust 2, 2020
  • Cal State Northridge Pays Ransom To Hackers After Cyberattack

    • The fallout continues Sunday after officials at California State University, Northridge announced it had indirectly paid ransom to hackers, who stole some of its data.
    • Students are now attempting to assess just how at risk they are, now that they have been notified that ransomware criminals broke into the CSUN network to lock users out of school servers.
    | August 2, 2020
    hak-iq.us20.list-manage.comAugust 2, 2020
  • Employers urged to ensure data privacy in work-from-home scheme

    • THE National Privacy Commission (NPC) is reminding employers of their responsibility under the Data Privacy Act to implement policies and processes that ensure the security and privacy of their customers and employees as telecommuting or work-from-home arrangements become widespread.
    • It is the employer’s responsibility to identify the risks inherent in a telecommuting or work from home arrangement and come up with the proper policies and processes for these arrangements and ensure that there are mechanisms to monitor that they are being implemented properly.
    Philippines | August 2, 2020
    hak-iq.us20.list-manage.comAugust 2, 2020
  • Businesses are preparing for a cloud-based approach to applications

    • The road to modern applications can be arduous as complex legacy infrastructure, inefficient manual processes and organizational silos persist as barriers to progress.
    • There are four pillars to a successful modern applications strategy: cloud native applications (built with microservices), cloud native platforms, continuous integration / continuous delivery pipelines and adoption of DevOps culture and practices.
    | July 30, 2020
    hak-iq.us20.list-manage.comJuly 30, 2020
  • Twitter pins its July 15th breach on a phone spear phishing attack

    • According to Twitter, the answer is a phone spear phishing attack that targeted a “small number” of employees who did not all have access to management tools. However, attackers then “used their credentials to access our internal systems and gain information about our processes.”
    • Twitter also released more details about what the attackers did with that access — targeting 130 accounts, tweeting from 45, accessing the DM inboxes of 36 and copying account data from 7.
    engadget - Richard Lawler | July 29, 2020
    hak-iq.us20.list-manage.comJuly 29, 2020
  • Public cloud environments leave numerous paths open for exploitation

    • Cloud estates are being breached through their weakest links of neglected internet-facing workloads, widespread authentication issues, discoverable secrets and credentials, and misconfigured storage buckets.
    • While public cloud providers such as AWS, Microsoft Azure, and Google Cloud Platform keep their platforms secure, customers are still responsible for securing the workloads, data, and processes they run inside the cloud – just as they do in their on-prem world.
    | July 29, 2020
    hak-iq.us20.list-manage.comJuly 29, 2020
  • Distance learning makes universities more vulnerable to cyberattack

    • It does kind of harken back to the beginning of DDoS, over 20 years ago, where actually on the beginnings of the internet, it was largely educational institutions and research institutions that would have communications between each other to facilitate the exchange of large files, research, etc.
    • And in those days, one university would attack another university just to kind of prove that they could, and it was more of like a War Games that would happen between graduate students, or even professors in universities.
    • Today, that's become a lot more commercial.
    - Karen Roby | July 28, 2020
    hak-iq.us20.list-manage.comJuly 28, 2020
  • Covid Crimes: Espionage, Hackers And Why America Is Vulnerable

    • Strong evidence indicates that Russia, China and potentially other adversaries have been attempting to hack universities and research institution’s databases to steal potentially lifesaving Covid-19-related intellectual property.
    • With millions of lives and trillions of dollars at stake, the U.S. is in a dangerous place when it comes to vulnerabilities associated with the pandemic – one of which is cybersecurity.
    • Train and test your employees never to click untrusted links or transfer funds without a telephone authorization from someone they know, and not to go to dangerous or suspect websites (like porn or gaming sites) on any device connected to the company’s infrastructure.
    - Nicole Fisher | July 28, 2020
    hak-iq.us20.list-manage.comJuly 28, 2020
  • Hacker leaks 386 million user records from 18 companies for free

    • ShinyHunters has been involved in or responsible for a wide assortment of data breaches this past year, including Wattpad, Dave, Chatbooks, Promo.com, Mathway, HomeChef, and the breach of Microsoft private GitHub repository.
    • Databases stolen in data breaches usually are privately sold first, with prices ranging between $500 (Zoosk) to $100,000 (Wattpad).
    • Once they are no longer profitable, threat actors commonly release them on hacker forums to increase their community reputation.
    - Lawrence Abrams | July 28, 2020
    hak-iq.us20.list-manage.comJuly 28, 2020
  • Cyber Security Today – Lessons in cloud security learned from a data breach

    • Cloud storage saves money for organizations. But it can increase the risk of applications being hacked over the Internet unless IT administrators keep a close eye on things.
    • Unfortunately slip-ups in storage configuration can allow hackers into a system.
    • That’s what happened earlier this month to a company called Twilio.
    - Howard Solomon | July 27, 2020
    hak-iq.us20.list-manage.comJuly 27, 2020