Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Babylon Health admits ‘software error’ led to patient data breach

    • Babylon Health,  a UK AI chatbot and telehealth startup which has been valued in excess of $2BN, has suffered an embarrassing data breach after a user of the app found he was able to access other patients’ video consultations.
    • While Babylon is spinning this breach as “small” — and in numbers affected terms that seems to be the case — medical information is among the most sensitive personal data there is.
    - Natasha Lomas | June 10, 2020
    hak-iq.us20.list-manage.comJune 10, 2020
  • Phishing: Why remote working is making it harder for you to spot phoney emails

    • According to Mimecast, impersonation fraud jumped by almost a third during the first 100 days of the coronavirus pandemic, as cyber criminals looked to take advantage of how many people are suddenly working remotely.
    • In an office, it would be relatively simple to check if a colleague had sent a request for a business bank transfer by walking over and asking if they'd sent the message – but with people suddenly working from home, making those checks isn't so simple.
    • This means that they are more susceptible to impersonation attacks that encourage individuals to perform an action such as carrying out wire transfer or sharing sensitive data.
    - Danny Palmer | June 9, 2020
    hak-iq.us20.list-manage.comJune 9, 2020
  • Security Drift – The Silent Killer

    • Global spending on cybersecurity products and services is predicted to exceed $1 trillion during the period of five years, between 2017 to 2021, with different analysts predicting the Compound Annual Growth Rate (CAGR) at anywhere between 8 to 15%.
    • And yet, data breaches continue.
    • The sad news is that about 80% of data breaches can be prevented with basic actions; such as vulnerability assessments, patching, and proper security configurations.
    | June 9, 2020
    hak-iq.us20.list-manage.comJune 9, 2020
  • The Threat of Compromised Passwords

    • Compromised passwords pose a significant threat to the security of organizations and individuals and as time ticks on, the list of exposed passwords continues to grow at an alarming rate. In fact, according to the Verizon Data Breach report, 81% of hacking-related breaches leveraged either stolen and/or weak passwords.
    • Exposed password screening and compromised credential screening is starting to become more widely used due to its ability to alert users when their password has been exposed and is therefore no longer safe to use.
    - Enzoic | June 9, 2020
    hak-iq.us20.list-manage.comJune 9, 2020
  • Pandemic – The perfect storm for cyber and physical security attacks

    • A majority of corporate users were all at the same physical place as where the corporate security controls reside. The place where most of the hardware assets reside or are mainly used are a few corporate offices, and most assets leaving corporate office will be back there within 12-16 hours as that is where they are used the most.
    • Now, this has changed. Corporate offices have very few humans left in them, but still have all the infrastructure, while end points (computers and mobiles) are now operated from home. The few humans left in offices are the security guards.
    • Cyber security has long talked about the concept of de-parameterisation since the early days of the Jericho Forum, and many corporate businesses felt that they had actually implemented it. However, this approach has since been recognised as being flawed, because once an intruder got past the castle gates, they were able to get anywhere and do almost anything.
    - Sarb Sembhi | June 8, 2020
    hak-iq.us20.list-manage.comJune 8, 2020
  • Phishing Attack Hits German Coronavirus Task Force

    • More than 100 executives at a multinational company that’s part of a German task force for creating coronavirus protective gear, were targeted in an ongoing phishing attack.
    • Researchers are warning of an ongoing phishing attack that’s targeting the credentials of more than 100 high-profile executives at a German multinational corporation that’s tasked with procuring coronavirus medical gear for Germany.
    - Lindsey O'Donnell | June 8, 2020
    hak-iq.us20.list-manage.comJune 8, 2020
  • Fitness Depot notifies customers of data breach

    • The Canadian retailer was informed of the data breach on May 20, and recently sent a breach notification letter to all potentially impacted customers.
    • Fitness Depot blames its internet service provider for the data breach, claiming it "neglected to activate the anti-virus software on our account."
    • It’s unclear what Fitness Depot is referring to since it’s not typically an ISP’s job to equip its customers' e-commerce platforms with anti-virus software.
    - Sarah Brennan | June 8, 2020
    hak-iq.us20.list-manage.comJune 8, 2020
  • 8 Ways To Protect Yourself From Common Work From Home Online Scams

    • Over 100,000 new domains being registered in the last few weeks contain words like ‘covid’, ‘virus’, ‘corona’ and others in the past few weeks. Although some might be legitimate, these new domains are most likely to be interlinked and used as a means to spread malware to unsuspecting visitors.
    • For the millions of people working from home, security measures taken at the office need to be followed at home.
    - Anil Bhasin | June 7, 2020
    hak-iq.us20.list-manage.comJune 7, 2020
  • How To Build A Business Case For Endpoint Security

    • Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.
    • Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access.
    • The best business cases bridge the gap between IT and Operations needs. CIOs need endpoint security solutions to be low-cost, low maintenance, reliable yet agile.
    • Operations want an endpoint solution that has a low cost of support, minimal if any impact of IT Service Help Desks, and always-on monitoring.
    Enterprise Irregulars - Louis Columbus | June 6, 2020
    hak-iq.us20.list-manage.comJune 6, 2020
  • Top US aerospace services provider suffers breach, loses 1.5 TB of data

    • The Texas-based aerospace services provider VT San Antonio Aerospace (VT SAA) has become a victim of a ransomware attack.
    • The group behind the breach is claiming it stole 1.5 terabytes of sensitive organizational data from the company’s network.
    • MAZE ransomware can be embedded into phishing emails and as soon as it infects the machine it starts the file encryption process, and attackers demand a ransom. In case their demands are not met the group starts leaking data.
    HackRead - Deeba Ahmed | June 6, 2020
    hak-iq.us20.list-manage.comJune 6, 2020