Daily NCSC-FI news followup 2019-08-27

US GOV: DHS stored data from bioterrorism defense on an insecure website for a decade


Nato: a serious cyberattack could trigger Article 5 of our founding treaty.

www.prospectmagazine.co.uk/world/nato-will-defend-itself We have designated cyberspace a domain in which Nato will operate and defend itself as effectively as it does in the air, on land, and at sea. This means we will deter and defend against any aggression towards allies, whether it takes place in the physical world or the virtual one.

Cybersecurity Firm Imperva Discloses Breach (Data from 2017)

krebsonsecurity.com/2019/08/cybersecurity-firm-imperva-discloses-breach/ Imperva, a provider of Internet firewall services that help Web sites block malicious cyberattacks, alerted customers on Tuesday that a recent data breach exposed email addresses, scrambled passwords, API keys and SSL certificates for a subset of its firewall users.

NZ: Passports, licenses of 300 leaked in Ministry for Culture and Heritage data breach


Recent HIPAA settlements highlight the weaknesses in healthcare security

www.zdnet.com/article/recent-hipaa-settlements-highlight-the-weaknesses-in-healthcare-security/ In the past, device loss and theft were top causes of HIPAA settlements, but this is no longer the case as healthcare providers mature their security practices. We now see hacking/IT incidents as the top cause of breaches leading to HIPAA investigations.

GitHub improves security by enabling WebAuthn


How I Hacked Instagram Again (and got $10’000 via bug bounty)


Huawei in Talks To Install Russian Aurora OS On Tablets For Russia’s Population Census

www.reuters.com/article/us-huawei-russia-partnership/huawei-in-talks-to-install-russian-operating-system-on-tablets-for-countrys-population-census-sources-idUSKCN1VG1VN Russia is discussing the use of Aurora OS on 360,000 Huawei tablets by August 2020.

US Officials Fear Ransomware Attack Against 2020 Election


Security researchers warn that the WS-Discovery protocol is currently being abused for massive DDoS attacks.

www.zdnet.com/article/protocol-used-by-630000-devices-can-be-abused-for-devastating-ddos-attacks/ Currently, according to internet search engine BinaryEdge, there are now nearly 630,000 devices that support the WS-Discovery protocol and are ripe for abuse.

New Lyceum APT is targeting oil and gas companies in the Middle East, and telecoms across Africa and Asia.

www.zdnet.com/article/middle-east-cyber-espionage-is-heating-up-with-a-new-group-joining-the-fold/ Also:


China Chopper still active 9 years later


Malicious Android app CamScanner had more than 100 million downloads in Google Play

www.kaspersky.com/blog/camscanner-malicious-android-app/28156/ CamScanner was actually a legitimate app for quite some time. However, at some point, that changed, and recent versions of the app shipped with an advertising library containing a malicious module.

Transport for London asked passenger to write down password on paper form.


Australia to ban mobile phone usage in schools from next year


You might be interested in …

Daily NCSC-FI news followup 2020-03-27

Best password managers for business in 2020: 1Password, Keeper, LastPass, and more www.zdnet.com/article/best-password-managers/ Everyone needs a password manager. Period, full stop. It’s the only possible way to maintain unique, hard-to-guess credentials for every secure site you, your family members, and your team access daily. Booz Allen analyzed 200+ Russian hacking operations to better understand their […]

Read More

Daily NCSC-FI news followup 2020-01-30

Enterprise Hardware Still Vulnerable to Memory Lane Attacks www.darkreading.com/vulnerabilities—threats/enterprise-hardware-still-vulnerable-to-memory-lane-attacks/d/d-id/1336921 Most laptops, workstations, and servers are still vulnerable to physical attacks via direct memory access, despite mitigations often being available, report says.. Report: eclypsium.com/2020/01/30/direct-memory-access-attacks/ Dozens of companies have data dumped online by ransomware ring seeking leverage arstechnica.com/information-technology/2020/01/dozens-of-companies-have-data-dumped-online-by-ransomware-ring-seeking-leverage/ Maze operators “gift” Pensacola by removing data dump, but […]

Read More

Daily NCSC-FI news followup 2020-12-14

Kyberuhat yleistyvät Miten Suomen yritykset pärjäävät? www.etla.fi/julkaisut/kyberuhat-yleistyvat-miten-suomen-yritykset-parjaavat/ Vaikka Suomen yritysten kyberturva onkin Euroopan keskitasoa vahvempaa, on Suomi jäämässä kehityksen kärjestä useilla eri mittareilla arvioituna. Erityisesti tietovuodot vaikuttavat tuottavan kotimaisille yrityksille poikkeuksellisen paljon haasteita. Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html FireEye has uncovered a widespread campaign, […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.