Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.


FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • Man Gets Prison For DDoSing Steam, EA, Microsoft, Sony, Nintendo, DOTA2, Riot Games

    Source: Fossbytes
    By: Aditya Tiwari
    Published: July 5, 2019
    * In one of its kind acts, a Utah-based man named Austin Thompson(23) is going to prison for launching DDoS attacks on servers of variousgaming companies.
    * The hacker, who goes by the online moniker DerpTrolling,compromised the servers of Microsoft Xbox, Sony Play Station, Quake Live,DOTA2, League of Legends, and Steam between December 2013 and January 2014.
  • What the ransomware attack debate is missing

    Source: The Hill
    Published: July 5, 2019
    * High-profile attacks against Atlanta, Baltimore and now RivieraBeach, Lake City and Key Biscayne in Florida expose the challengesgovernors, mayors and local leaders confront in deciding whether to pay aransom to cyber criminals to regain control of their data.
    * Arguments have been made that no government official should pay aransom (Atlanta), that the federal government is to blame for allowingcyber attack tools to be stolen and released on the internet (Baltimore),and that paying a ransom is the only option (Riviera Beach).
  • Incident Of The Week: Dominion National Finds Evidence of Data Breach Nearly a Decade Later

    Source: Cyber Security Hub
    By: Kayla Matthews
    Published: July 5, 2019
    * In late April 2019, Dominion National investigated an internalalert with the assistance of an outside cybersecurity firm.
    * The results showed that unauthorized parties could have hadaccess to some of the companies servers since August 25, 2010.
  • House bill targets use of Pentagon networks for child pornography

    Source: The Hill
    By: Maggie Miller
    Published: July 2, 2019
    * The End National Defense Network Abuse (END Network Abuse) wasintroduced in the wake of in an investigation called 'Project Flicker'carried out by U.S. Immigration and Customs Enforcement.
    * This investigation identified over 5,000 individuals, includingmany affiliated with DOD, who were subscribed to child porn websites.
  • How a grim Eurovision Song Contest cyber attack was prevented at last second

    Source: 9News
    By: Fiona Willan
    Published: July 2, 2019
    * As millions of people around the world tuned into this yearsEurovision Song Contest final in Tel Aviv, little did they know they werewithin one second of witnessing a grim cyber attack.
    * Foreign hackers infiltrated the system broadcasting the eventglobally online and tried to insert a disturbing video into the live feed.
  • Medtronic rushes to replace insulin pumps after flaws found

    Source: Naked Security
    By: John E. Dunn
    Published: July 2, 2019
    * US medical equipment giant Medtronic has announced the immediate recall of all MiniMed 508 and Paradigm series insulin pumps after researchers uncovered serious security flaws which can't be patched.
    * The job of a pump is to deliver insulin to a patient throughout the day via a catheter implanted under the skin, which removes the need for regular injections to maintain stable blood glucose levels.
  • Websites go down worldwide due to Cloudflare outage

    Source: The Hill
    By: Maggie Miller
    Published: July 2, 2019
    * Internet network and security provider Cloudflare experienced a massive outage, with websites around the world unable to load and the cause of the outage not immediately clear.
    * The outage did not appear to last long, with Cloudflare posting online that it had "implemented a fix for this issue" and that it was "monitoring the results" 23 minutes after it wrote that "we are working to mitigate impact to Internet users."

  • Mac Malware Pushed via Google Search Results, Masquerades as Flash Installer

    Source: ThreatPost
    By: Lindsey O'Donnell
    Published: July 2, 2019
    * Never-before-seen Mac malware, dubbed OSX/CrescentCore, has been discovered in the wild.
    * The trojan, spotted on various websites masquerading as an Adobe Flash Player installer, drops malicious applications and browser extensions on victims' systems when downloaded.

  • How To Secure The Internet Of Battlefield Things From Cyber Attacks

    Source: National Interest
    By: Dan Goure
    Published: June 30, 2019
    * It should come as no surprise that the IOT has extended togovernment networks, particularly those operated by the Department of Defense (DoD).
    * The result is what some observers call the 'Internet ofBattlefield Things' (IOBT). There is a general consensus among experts that the military which first creates the IOBT will gain a decisive advantage over its competitors.
  • AI, Cyber Get Big Boost in Senate-Passed NDAA

    Source: NextGov
    By: Jack Corrigan
    Published: June 28, 2019
    * A massive defense policy bill approved by the Senate on Thursday is loaded with provisions to advance the Pentagon's tech and protect the country against digital threats posed by Russia and China.
    * The legislation would authorize hundreds of millions of dollars for artificial intelligence and cyber research, and support efforts to lockdown the government supply chain, fight foreign misinformation and bolster the Pentagon's tech workforce.

San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017