Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Twitter apologises for business data breach

    • Twitter has emailed its business clients to tell them that personal information may have been compromised.
    • Unbeknownst to users, billing information of some clients was stored in the browser's cache, it said.
    | June 23, 2020
    hak-iq.us20.list-manage.comJune 23, 2020
  • Australia targeted by sophisticated cyber attacks

    • Prime Minister Scott Morrison announced on Friday 19 June that, based on the advice provided by the Federal Government’s cyber experts, a “sophisticated state-based cyber actor” was targeting Australian organisations.
    • “We know it’s a sophisticated state-based cyber actor because of the scale and nature of the targeting and the tradecraft used."
    • China denies responsibility for the attacks
    - Kim Ho | June 23, 2020
    hak-iq.us20.list-manage.comJune 23, 2020
  • 5 Mistakes Your Remote Team Should Avoid

    • There are possible mistakes your remote team could make that can hurt you.
    • That is why you need to be conversant with some of them to save you from cybersecurity risks that can cost your business millions.
    | June 22, 2020
    hak-iq.us20.list-manage.comJune 22, 2020
  • 50 Stats Showing Why Companies Need To Prioritize Consumer Privacy

    • As cybersecurity threats increase, more consumers are concerned about who has their data and how it is used.
    • New regulations have been put in place around the world to return power to customers to take control of their data.
    • Although consumer confidence in how companies handle data isn’t high, organizations have a huge opportunity to proactively buoy their privacy plans to better protect customer data and improve the overall experience.
    - Blake Morgan | June 22, 2020
    hak-iq.us20.list-manage.comJune 22, 2020
  • China cyber attacks: Beijing’s misinformation war against Australia

    • For years, China has been waging a secret war on its enemies and allies alike – now it’s moving out into the open, and Australia has had enough.
    • Last week, the European Union (EU) issued a report concluding Russia and China had led targeted disinformation campaigns designed to destabilise democratic processes and to paint their authoritarian leaders in a positive light.
    • Shortly later, Twitter confirmed the finding by announcing it had deactivated 32,000 fake anonymous accounts that had been operated by state-controlled propaganda units.
    - Jamie Seidel | June 22, 2020
    hak-iq.us20.list-manage.comJune 22, 2020
  • Why businesses struggle to unlock value from their data

    • Data has become a critical component for businesses in every sector, yet many struggle when it comes to extracting full value from it.
    • Unlocking this value from data is proving something of a challenge. This is because a large proportion of data held within organisations is stored (or even trapped) in infrastructure silos located both on-premises and in cloud-based platforms.
    • This situation not only means the data difficult to manage, but it also makes deriving value from the data very complex.
    - Steve Coud | June 22, 2020
    hak-iq.us20.list-manage.comJune 22, 2020
  • Common misconceptions about smart homes and biometrics

    • Smart home integration is gaining popularity – especially in modern times with more people confined to their homes by Covid-19.
    • The most common misconception is the immunity of biometrics to potential attack. It is critical to disengage the connection between data breach stories and biometrics, by focusing on the fact that the real cause of most attacks is not biometrics itself, but the storage of biometrics data in a centralised database.
    - Andrew Shikiar | June 22, 2020
    hak-iq.us20.list-manage.comJune 22, 2020
  • Turn on MFA Before Crooks Do It For You

    • Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen.
    • But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control.
    - Brian Krebs | June 19, 2020
    hak-iq.us20.list-manage.comJune 19, 2020
  • CIA's 'woefully lax' security allowed the 'Vault 7' data breach

    • A new report into how WikiLeaks revealed the CIA's tools for hacking Macs slams the security agency's "unacceptable" lack of security over its own systems.
    • The report confirms that between 180GB and 34 terabytes of information were leaked, but the investigators still can't be more precise because of inadequate security on the systems involved.
    • It notes that it's only because WikiLeaks published the data that the CIA knew it had been stolen.
    ai - William Gallagher | June 17, 2020
    hak-iq.us20.list-manage.comJune 17, 2020
  • Work from home, work from anywhere: Are you secure everywhere?

    • As millions of employees continue to work from home for the foreseeable future and in some cases perhaps indefinitely, balancing the ongoing demands of employee productivity and information security will be paramount.
    • When the pandemic first hit, IT departments responded quickly with what one IT analyst called the “Remote Lite” approach—just get staff the basic equipment they need to work from home as efficiently as possible.
    • Now, however, “Remote Lite” needs to quickly morph into a more “Remote Right” approach which takes into account the requirements of permanently managing remote employees’ security, connectivity and productivity.
    - Mick Slattery | June 17, 2020
    hak-iq.us20.list-manage.comJune 17, 2020