Global Cyber News Digest

Daily News Digest

Stay current on the global cyber threat landscape and industry developments with CCOE’s daily digest and library of cybersecurity news and articles.

  • Enable Password Leak Detection in Google Chrome for Enhanced Security
    • Very recently, Google added this new security feature to Chrome known to be "Password Leak Detection" or "Password Protection".
    • This feature came as an official extension at first but was later added to Chrome as part of the browser's password manager.
    • If you come across any password which is known by Google that has been compromised, make sure to change it immediately.

      The Windows Club - Ankit Gupta | January 1, 2020
    thewindowsclub.comJanuary 1, 2020
  • A huge security camera company just had a huge security breach
    • Wyze Labs lets consumers surveil their own homes -- and its huge data breach doesn't inspire trust.
    • The breach included information like WiFi network details and customer email addresses.
    • As security breaches accumulate, consumers are particularly at risk if they use the same passwords and login names on different sites, as many databases of breached usernames and passwords are already public.

      Salon - Nicole Karlis | January 1, 2020
    salon.comJanuary 1, 2020
  • 2019 Data Breach Hall of Shame: These were the biggest data breaches of the year
    • The words "unsecured database" seemed to run on repeat through security journalism in 2019.
    • Calculating the hours and dollars spent by people trying to recover from the shameful negligence of some of these companies would be nearly impossible.

      C|Net - Rae Hodge | December 27, 2019
    cnet.comDecember 27, 2019
  • Sophisticated Technical Cyber Threats Will Give Way to Low-tech Attacks in 2020
    • Email security and anti-phishing firm Agariâ's much-anticipated annual list of predictions is out and shows that top information-security professionals will grapple with a very different type of attack going into the new year.
    • "...companies need to watch out for low-tech and social-engineered attacks at scale. These types of threats are the most effective, thus harmful."

      AIthority | December 23, 2019
    aithority.comDecember 23, 2019
  • 5 Steps To Develop An Incident Response Plan
    • Itâ's almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity.
    • Cybersecurity not only means that you protect your digital assets against a cyberattack, but it also means that you must plan for the inevitable.

      Forbes - Michelle Drolet | December 23, 2019
    forbes.comDecember 23, 2019
  • The Worst Hacks of the Decade
    • Over the last decade, hacking became less of a novelty and more of a fact of life for billions of people around the world.
    • It's been apparent for decades that an increasingly computerized world would inevitably invite constant digital threats.
    • But the actual evolution of hacking--with all its scams, criminal black markets, and state sponsored forces—has been characteristically human, not a sterile, dispassionate artifact of an unknown future.

      Wired - Lily Hay Newman | December 23, 2019
    wired.comDecember 23, 2019
  • WAWA DATA BREACH 2019: HOW TO CHECK IF YOU HAVE BEEN AFFECTED
    • Malware was present on most store systems between March 4 and April 22, 2019.
    • The company says it has notified law enforcement and payment card companies, as well as engaging a "leading external forensics firm" to support response efforts.
    • ...wouldn't be surprised to see the card information ending up in underground shops--such as Joker's Stash...

      Newsweek - Sophia Waterfield | December 20, 2019
    newsweek.comDecember 20, 2019
  • Ring Throws Customers Under the Bus After Data Breach
    • Just a week after hackers broke into a Ring camera in a child's bedroom, taunting the child and sparking serious concerns about the company's security practices, Buzzfeed News is reporting that over 3,600 Ring owners' email addresses, passwords, camera locations, and camera names were dumped online.
    • Ring has claimed that this attack was the result of credential stuffing, a technique where attackers gather usernames and passwords compromised in another data breach and try them on other websites.

      Electronic Frontier Foundation - Cooper Quintin and Bill Budington | December 20, 2019
    eff.orgDecember 20, 2019
  • YOUR CAR COULD BE AT RISK FOR CYBER ATTACKS
    • As vehicles become smarter and more connected to WiFi networks, hackers will have more opportunities to breach vehicle systems.
    • Connecting your smartphone through a USB port can give a hacker backdoor access to data from both your phone and your car.
    • Google Android users who can download apps from unverified sites are even more at-risk.

      Futurity - Caroline Brooks | December 19, 2019
    futurity.orgDecember 19, 2019
  • Jet2 worker quit job then launched cyber attack on 2,000 employees
    • A former Jet2 worker launched a cyber attack on the company's computer systems - and hacked into the CEO's inbox to see if they had caught him.
    • Just days after leaving his job working for the airline company Scott Burns, 27, from Morley in Leeds, deleted files which meant 2,000 employees could not log into their systems - taking down the network for 12 hours.

      Examiner Live - Lauren Ballinger | December 19, 2019
    examinerlive.co.ukDecember 19, 2019