Scroll Top

The Latest 17 Security breaches Worldwide – Week 26, 2019


17 Security breaches Worldwide – Week 26, 2019

Be informed about the latest 17 Security breaches Worldwide, identified and reported publicly during Week 26, 2019. As these security-related breaches have a severe negative impact on any business, consider a security AUDIT to prevent any similar cases.

  • Malware called Silex has been targeting numerous IoT devices.
    • What is interesting is that the author is a 14-year old who goes by the handle Light Leafon. The malware exploits the default credentials and deletes any storage and configuration settings. Over 2,000 devices have been bricked in the span of a few hours. Attacks still ongoing. New Silex malware is bricking IoT devices, has scary plans

  • Hacking groups are targeting hotel WiFi networks because they are a rich data source.

  • Argos is a major UK retailer that was a frequent phishing lure last year.
    • Those attacks have continued, according to researchers. This post dissects the phished messages, showing the various tells such as a spoofed origination address, hidden URLs and copies of the company’s logos and email templates. The messages have eluded detection on some gateways. Phishing Attacks on High Street Target Major Retailer

  • A personal post from security researcher Robert Heaton. He received a very convincing email request to judge an academic prize.

  • A new FireEye report shows a recent spike in URL-based HTTPS phishing attacks
    • Why phishers are using HTTPS links in their lures. FireEye has noted this trend in a recent report and they expound on how it has made the lures more believable. If you get a message with just a link and no other content, don’t be tempted to click on it. HTTPS Phishing: The rise of URL-based attacks


Protect your WordPress: BEFORE IT’S TOO LATE! You will also protect your customers, your reputation and your online business!

Discover trending and viral stories about Security breaches Worldwide. The remaining Security breaches made news headlines. All these happened just last week.

  • The Philadelphia courts’ computer networks have been offline for more than a month after several PCs were hit with malware.

  • Data was stolen from the network of NASA’s Jet Propulsion Lab in Pasadena, thanks to a hacked Raspberry Pi computer.

  • Operation Soft Cell
    • Researchers identified a new Chinese threat group that is targeting telco providers. They call it Operation Soft Cell, and found it has been active since 2017, with a goal of obtaining call detail records from at least ten major telecom providers. This is a very target-rich environment: last year nearly a third of telecom providers reported some customer data stolen from their networks. These records can reveal all sorts of life patterns of the phone users and other sensitive metadata. What makes this group noteworthy is how often they changed attack methods (every quarter, as shown in the diagram above) and how focused they were. The attack began with a malware-infested web shell to gather intelligence about the enterprise infrastructure. The group used modified versions of the PoisonIvy RAT, Mimikatz, a Netbios-based network scanner, and other tools to penetrate various servers. Hackers are stealing years of call records from hacked cell networks and Telecom Report: Telecommunications industry woefully unprepared for cyberattacks and OPERATION SOFT CELL: A WORLDWIDE CAMPAIGN AGAINST TELECOMMUNICATIONS PROVIDERS

  • The LokiBot and Nanocore malware authors have combined forces, according to new research.

  • A group of consumer advocates has filed a petition to the U.S. Federal Trade Commission.
    • They are trying to call attention to secret surveillance scoring techniques by major retailers. The scores are compiled from online behavior and from data brokers. They are used to charge some customers higher prices or get better customer service. Advocates push FTC crackdown on secret consumer scores



Get Healthy, Stay Healthy: A healthier online business starts today and it begins with you!

Do you have any concerns with Security breaches? Leave your thoughts in the comments below!

Related Posts