19 Security breaches Worldwide - Week 10, 2019
Be informed about the latest 19 Security breaches Worldwide, identified and reported publicly during Week 10, 2019. As these security-related breaches have a severe negative impact on your business, consider a security AUDIT to prevent any similar cases.
- This firm has developed the Pwn Index, a score for the price of leaked data from breaches.
- The average price is more than $15,000, and it is increasing. RunSafe Pwn Index
- The Lime RAT malware has been involved in some new phishing campaigns.
- It combines ransomware, cryptominer, info stealer, a worm and a keylogger. That is a lot of trouble bundled together. This post dissects its operation and how it uses multiple IP ports for its communication channels. Lime RAT: Why It Caught Our Eye and How this Versatile Malware Works
- Every day Zimperium detects 600M wireless threats using its software tools.
- This post describes the open WiFi access spots in and around the Moscone Center this past week, about four thousand each day with more than 600 unique SSIDs launching attacks.. The actual show network was secure, though. Malicious WiFi Connections: Welcome to RSA Conference 2019
- This is one of the best explainers on Mimikatz that I have seen.
- It is a popular hacking tool that is also used by defenders. For example, it was part of the NotPetya and BadRabbit attacks. It leverages the Windows SSO to harvest credentials. It also has several tips on how you can defend against its misuse, such as hardening the Local Security Authority to stop code injections and turning off debugging privileges. What is Mimikatz? And how to defend against this password stealing tool
- 12 Ways to Hack 2FA
- Passwords are finally being left behind in favor of two-factor (2FA) and multifactor (MFA) authentication. Some vendors are promoting “unhackable” 5FA solutions. It’s all a lie. All authentication solutions can be hacked. Come learn at least 12 ways 2FA can be hacked, how 2FA really works behind the scenes, what the holes are, how to hack it and how you can defend against those attacks. 12 Ways to Hack 2FA
- Report by academic researchers examines the role played by criminal use of SSL certificates that are sold across the dark web.
- It shows how the ecosystem works and how they are used by attackers. TLS/SSL certificates are now a valuable component of cybercriminal toolkits. TLS Certificates and Their Prevalence on the Darknet
- A new report from 4iQ looks at the past year’s top 12 breaches.
- The six “Collections” was in the top spot. For the first time, underground data brokers are actively including in their offerings citizen data, such as voter data. There is some good news: the number of leaky devices is slowly on the decline. IDENTITIES IN THE WILD: THE LONG TAIL OF SMALL BREACHES
- This is an interesting study about what kinds of authentication security is required when a user in distress calls 35 different support centers.
- The short answer: not as much as we’d all like. Netflix and Amex call centers were solid, others could be easily phished for your identity details. Note, this differs from the tech support scammers that call and try to trick you. Shifting Strategies: Using Social Media, SEO in Tech Support Scams
- Symantec has a new report on the Whitefly malware that is targeting Singaporean users.
- This is the same group that hit their national health service last summer. It begins its attack with a malicious executable attachment using spear-phished emails. Whitefly: Espionage Group has Singapore in Its Sights
Protect your WordPress: BEFORE IT'S TOO LATE! You will also protect your customers, your reputation and your online business!
Discover trending and viral stories about Security breaches Worldwide. The remaining Security breaches made news headlines. All these happened just in the last 7 days.
- A total of 45,000 patients of the Rush Medical System patients may have been compromised in a data breach.
- The exposed data may include names, addresses, birthdays, Social Security numbers and health insurance information. Rush Health System Reports Data Breach Affecting 45,000
- A report that examines three million mobile apps running on half a million devices shows how they have been compromised by various attacks.
- It covers threats to apps, to networks, and to the overall device OS itself. Most of the phony malicious apps are trying to steal data (see the bar chart below) or manipulate the actual device itself. More than half of mobile apps examined have data leak issues and other vulnerabilities. Also, phishing attacks have shifted over to the mobile space lately. MOBILE SECURITY REPORT
- Here is an overview of GandCrab ransomware.
- Since appearing last year, it has become one of the most prolific malware strains. The report includes how it has evolved, the harm it can inflict, how it is delivered, how it communicates with its control servers, and other details. GandCrab 101: All about the most widely distributed ransomware of the moment
- The latest report from the Anti-Phishing working group is out.
- For the final quarter of 2018, the number of phishing attacks hosted on Web sites that have SSL certificates declined for the first time in history. Half of the originating domains that are used for phishing are the new generic ones such as .XYZ and .ONLINE. Phishing Activity Trends Report
- Google temporarily disabled Android-based photo sharing.
- Thanks to its Home device, you could display photos from several accounts on your connected TV. The problem is you could display anyone's pix. The company is trying to eradicate this bug. Google temporarily shuts down Android TV photo sharing after privacy bug
- Over the weekend, Palestinian hackers used DNS poisoning to infect web-based widgets with ransomware in popular Israeli news websites, such as YNETNEWS.
- The injected code misfired, however. The malicious file – a.k.a flashplayer_install.exe – appears to be a ransomware, i.e. malware that encrypts all of your files and then asks for a ransom in exchange for the decryption key. This sample is another example of malware that shows the hackers put a lot of effort into bypassing the AV and other protections. THREAT RESEARCH BLOG POST - OpJerusalem FlashInstaller Ransomware
- Chronicle, the Google/Alphabet subsidiary that was launched last year, introduced Backstory yesterday.
- Customers can upload their security telemetry logs to their cloud-based service and analyze them for threats. Many existing security tools offer this, but not at scale. Pricing wasn’t made public, but you can sign up for a webinar to learn more here.
- A new collection of unsecured MongoDB databases has been found.
- They contain conversations and private data from surveillance of millions of Chinese social media users, including the popular WeChat. Open MongoDB Databases Expose Chinese Surveillance Data
- Cryptocurrency miners are being deployed as rogue containers distributed on Docker’s open source Hub.
- Identifying these items is difficult and they can be used as entry points to enterprise networks. Developers should check API calls and access rights from containers to prevent this situation. Exposed Docker Control API and Community Image Abused to Deliver Cryptocurrency-Mining Malware
- Qbot is back in the news.
- Researchers have found a new campaign leveraging the banking credential stealer, using polymorphic methods that make detection difficult. It has so far infected more than 2,700 servers around the world. Varonis Exposes Global Cyber Campaign: C2 Server Actively Compromising Thousands of Victims
Get Healthy, Stay Healthy: A healthier online business starts today and it begins with you!