Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Watch Mayor Keisha Lance Bottoms’s Impassioned Speech on Unrest in Atlanta

    • Above everything else, I am a mother. I am a mother to four black children in America, one of whom is 18 years old. And when I saw the murder of George Floyd, I hurt like a mother would hurt.
    • This is not the legacy of civil rights in America. This is chaos, and we are buying into it. This won’t change anything, we are no longer talking about the murder of an innocent man. We are talking about how you are burning police cars on the streets of Atlanta, Georgia.
    • Go home.
    NY Magazine - Keisha Lance Bottoms | May 30, 2020
    hak-iq.us20.list-manage.comMay 30, 2020
  • Bank of America data breach – was your info exposed?

    • Of all the institutions that could be hit by a data breach, a bank is undoubtedly one of the worst. Not only are they finance hubs for millions of account-holders, but they also contain sensitive data like loan applications, Social Security numbers and taxpayer information.
    • Bank of America accidentally exposed personal and financial data for potentially thousands of PPP loan applicants.
    • The data was apparently exposed on April 22 during a test run on the U.S. Small Business Administration’s web platform, which was supposed to give companies a chance to make sure everything was working before the second run of applications was processed.
    - James Gelinas | May 30, 2020
    hak-iq.us20.list-manage.comMay 30, 2020
  • How SASE Can Stop Cyberattackers in Their Tracks

    • Organized crime and criminal groups are increasing the pressure on enterprises in the form of cyberattacks. For most, the pre-eminent tool of attack comes in the form of ransomware, disrupting the critical operations of business until a ransom is paid.
    • The real question becomes, What can be done to prevent such attacks?
    • One answer may be found in an emerging technology known as secure access service edge (SASE), a cloud-based solution built on SD-WAN technology and may become one of the predominant ways to defeat cybercriminals.
    - Frank Ohlhorst | May 28, 2020
    hak-iq.us20.list-manage.comMay 28, 2020
  • Fortune 500 company NTT discloses security breach

    • NTT says hackers gained access to its internal network and stole information on 621 customers from its communications subsidiary, NTT Communications, the largest telecommunications company in Japan, and one of the biggest worldwide.
    • The hack took place on May 7, and NTT says it became of the intrusion four days later, on May 11.
    • The company is still investigating the breach, which it made public today, but says it plans to notify all customers "when it becomes clear what should be notified."
    • NTT said it's also in the process of upgrading its IT infrastructure.
    - Catalin Cimpanu | May 28, 2020
    hak-iq.us20.list-manage.comMay 28, 2020
  • How hoteliers can mitigate data breaches

    • Hackers employ a range of methods to access data. For example, memory-scraping (also known as RAM-scraping) malware scans the memory of digital devices like point-of-sale systems to collect information.
    • With so many hotels working with only a skeleton crew thanks to furloughs, teams will need to monitor their networks remotely.
    • While cutting staff in an economic downtown is inevitable, a hotel cannot cut so many team members that it is left exposed to attacks.
    Hotel Management - Jena Tesse Fox | May 28, 2020
    hak-iq.us20.list-manage.comMay 28, 2020
  • Popular App Mathway Leaks 25 Million User Records

    • More than 25 million user records, belonging to popular math app Mathway, are being sold on the dark web.
    • The hack is the latest in a long line of security breaches carried out by a hacker going by the name of ShinyHunters, the threat actor also responsible for intrusions at Tokopedia, Wishbone, Zoosk, and others.
    - May 27, 2020
    hak-iq.us20.list-manage.comMay 28, 2020
  • 26% of IT security managers in KSA missed important family dates because of data breaches

    • A third of employees (30%) in Saudi Arabia who are involved in the aftermath of an incident missed important personal events, had to work overnight (26%), or suffered additional stress (23%). A quarter even had to cancel vacations (23%).
    • In ‘peace time’, it is best to prepare a list of steps for an IT department in case of an incident: who to inform first, who is responsible for what and what steps should be made. This helps employees feel prepared and can relieve potential panic and stress.
    | May 27, 2020
    hak-iq.us20.list-manage.comMay 27, 2020
  • C-suite execs often pressure IT teams to make security exceptions for them

    • The C-suite is the most likely group within an organization to ask for relaxed mobile security protocols (74%) – despite also being highly targeted by malicious cyberattacks.
    • C-level executives feel frustrated by mobile security protocols and often request to bypass them.
    | May 27, 2020
    hak-iq.us20.list-manage.comMay 27, 2020
  • 26 million LiveJournal credentials leaked online, sold on the dark web

    • Blogging platform LiveJournal appears to have suffered a security breach in 2014, according to multiple hackers who are now selling and freely trading the company's user database on the dark web and on hacking forums.
    • The Have I Been Pwned (HIBP) data breach indexing service announced that it received a copy of the LiveJournal user database and indexed it on its website.
    • According to HIBP, the data contained the usernames, emails, and plaintext passwords of 26,372,781 LiveJournal users.
    ZDNet - Catalin Cimpanu | May 27, 2020
    hak-iq.us20.list-manage.comMay 27, 2020
  • Malware opens RDP backdoor into Windows systems

    • A new version of the Sarwent malware can open the Remote Desktop Protocol (RDP) port on target Windows computers to make sure that crooks can find their way back into the system through the backdoor.
    • Affected users should know that removing the malware does not close that particular “backdoor”.
    • Sarwent is a piece of malware that started out as a loader for other malware, but has recently been updated with two new functionalities:
      • Execute commands via Windows Command Prompt and PowerShell
      • Create a new Windows user account, enable the RDP service for it, and make changes to the Windows firewall so that RDP access to the infected machine is allowed
    - Zeljka Zorj | May 26, 2020
    hak-iq.us20.list-manage.comMay 26, 2020