Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • What data breaches teach us about security procedures
    • Bots are now capable of performing upwards of 100 attacks per second, making it easier and faster for fraudsters to commit ATO fraud on a massive scale.
    • A recent study by Google found 66% of those polled said they use the same password for more than one online account, with the average user having 7.6 social media accounts.

      TechRadar - Labhesh Patel | April 17, 2020
    techradar.comApril 17, 2020
  • Misconfiguration Remains the #1 Cause of Data Breaches in the Cloud
    • 96% of cloud engineering teams are now 100% distributed and working from home in response to the novel Coronavirus crisis.
    • 83% have completed the transition or are doing so.
    • Of those making the shift, 84% are concerned about security vulnerabilities caused by new access policies, networks, and devices used for managing cloud infrastructure remotely.
    • Asked what they'd need to manage cloud misconfigurations more effectively and efficiently, 95% of IT pros cited tooling to automatically detect and remediate misconfiguration events.

      Security Boulevard - Filip Truta | April 16, 2020
    securityboulevard.comApril 16, 2020
  • 500K Zoom accounts for sale on the Dark Web - protect yourself now
    • Recently, more than 500,000 Zoom accounts credentials were discovered in Dark Web marketplaces for fire-sale prices.
    • Hackers are a crafty bunch, and this particular breach is a perfect example of why you should create as many unique passwords as you have accounts.
    • On top of that, you should consider storing your passwords in an encrypted cloud password manager.

      KIMKOMANDO - James Gelinas | April 16, 2020
    komando.comApril 16, 2020
  • San Francisco International Airport victim of cyber-attack in March 2020
    • As a result of cyber-attackers inserting malicious computer code on SFOConnect.com and SFOConstruction.com, user login credentials have been stolen.
    • Users possibly impacted by this attack include those accessing the websites from outside the airport network through Internet Explorer on a Windows-based personal device or a device not maintained by the airport.

      International Airport Review | April 15, 2020
    internationalairportreview.comApril 15, 2020
  • Linksys forces password reset for Smart Wi-Fi accounts after router DNS hack pointed users at COVID-19 malware
    • The mass reset took place after all user accounts were locked on 2 April, following infosec firm Bitdefender revealing that malicious persons were pwning Linksys devices through cred-stuffing attacks.
    • Hackers with access to Linksys Smart Wi-Fi accounts were changing home routers' DNS server settings. Compromised users' attempts to reach domains ranging from Disney, pornography, and Amazon AWS were redirected to a webpage peddling a coronavirus-themed app "that displays a message purportedly from the World Health Organization, telling users to download and install an application that offers instructions and information about COVID-19."

      The Register - Gareth Corfield | April 15, 2020
    theregister.co.ukApril 15, 2020
  • Creating a NIST Password Policy for Active Directory
    • NIST has recommended new password policy guidelines for Active Directory
    • Many security initiatives add additional burden to the organization. However, adopting a NIST password policy actually does the opposite.

      Security Boulevard - Enzoic | April 13, 2020
    securityboulevard.comApril 13, 2020
  • IT Security Risk Management Best Practices
    • IT security risk management is the practice of identifying what security risks exist for an organization and taking steps to mitigate those risks. Those steps can include using software, hardware, and personnel training to keep an environment secure from multiple threat vectors.
    • To prepare for hackers or other forms of attacks on these potentially insecure systems, an organization should find where the most critical and sensitive information resides, build a strategy to secure that information first, and use security fundamentals to secure it.

      sdxcentral - Connor Craven | April 13, 2020
    sdxcentral.comApril 13, 2020
  • MORE THAN 500,000 ZOOM ACCOUNT CREDENTIALS BEING SOLD ON DARK WEB FOR LESS THAN A PENNY EACH
    • Zoom--the leading video communication app used by schools and businesses to work remotely during the coronavirus pandemic--has fielded multiple security issues over the past several weeks.
    • Zoom founder Eric Yuan addressed the app's previous cybersecurity complaints in a message released April 1. "We recognize that we have fallen short of the community's--and our own--privacy and security expectations. For that, I am deeply sorry, and I want to share what we are doing about it..."

      Newsweek - EMILY CZACHOR | April 13, 2020
    newsweek.comApril 13, 2020
  • Work Remotely, Stay Secure!
    • 95% of fortune 1000 companies use AD.
    • Knowing that, the best approach to secure your remote workers is to secure the remote use of these AD credentials.
    • If hackers are able to compromise a set of credentials, they can then move laterally within your network until they find something valuable they can exploit.
    • Similar to the coronavirus itself, you might not even know you've been infected.

      CPO Magazine - FRANCOIS AMIGORENA | April 13, 2020
    cpomagazine.comApril 13, 2020
  • Cybersecurity: making manufacturing secure
    • Manufacturing is the third most likely sector to experience a data breach, after financial services and insurance.
    • But it's among the least protected, according to the manufacturers' organisation Make UK.
    • Appoint somebody with sole responsibility for cyber security for the organisation and provide them with a framework and reporting structure.

      Global Manufacturing - Graham Thomson | April 13, 2020
    manufacturingglobal.comApril 13, 2020