Daily NCSC-FI news followup 2019-09-02

Google White Hat Hackers Say Thousands of iPhones Have Been Hacked for Years

www.pandasecurity.com/mediacenter/news/google-iphones-hacked/ Last week computer security specialists from Google announced that thousands of iPhones had been hacked using a vulnerability seen in almost every version from iOS 10 through to the latest version of iOS 12. Googles Project Zero team, a division of Google that tries to find and report security vulnerabilities across popular systems, confirmed in a blog post that they had found evidence of attempted mass iPhone hack that has likely affected thousands of people over the last couple years.

Gamification Can Transform Company Cybersecurity Culture

threatpost.com/gamification-transform-company-cybersecurity-culture/147904/ Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture. Chief information security officers (CISOs) of Global 2000 enterprises have one of the toughest jobs in the world, defending their organizations cyberspace and being the guardian of its assets and private information. But CISOs also have a second, even bigger problem: Their own company employees.

BEC overtakes ransomware and data breaches in cyber-insurance claims

www.zdnet.com/article/bec-overtakes-ransomware-and-data-breaches-in-cyber-insurance-claims/ BEC-relatedcyber-insurance claims accounted for nearly a quarter of all claims in the EMEA region, AIG said. Business email compromise (BEC) has overtaken ransomware and data breaches as the main reason companies filed a cyber-insurance claim in the EMEA (Europe, the Middle East, and Asia) region last year, said insurance giant AIG.

Venäjä varautuu internetistä eristäytymiseen hanke on aika kunnianhimoinen ja vaativa

www.tivi.fi/uutiset/tv/e0115e2f-e41b-4eeb-a081-606d515bb49a Työ- ja elinkeinoministeriön valmiuspäällikkö Kari Klemm näkee yritysten roolin kasvavan, kun moderni tietoyhteiskunta varautuu uhkiin. Valtion turvallisuusverkko Tuve toimii jatkossa samassa verkossa muiden asiakkaiden kanssa. Ict-järjestelmät ovat kalliita, jos niillä ei ole muita käyttäjiä ja maksajia. Huoltovarmuusmielessä monet asiat on haluttu kiinnittää elinkeinoelämän toimintoihin, jolloin ylläpito ja kehitys on luontevasti osa arjen pyöritystä, Kari Klemm sanoo.

Astaroth Trojan Uses Cloudflare Workers to Bypass AV Software

www.bleepingcomputer.com/news/security/astaroth-trojan-uses-cloudflare-workers-to-bypass-av-software/ A new malicious campaign is actively distributing a new Astaroth Trojan variant by abusing the Cloudflare Workers serverless computing platform to avoid detection and block automated analysis attempts. Cloudflare Workers are scripts that run on Cloudflare servers from “data centers across 193 cities in 90 countries” and allow one to execute any JavaScript code without having to worry about infrastructure maintenance.

Teletext Holidays a) exists and b) left 200k customer call recordings exposed in S3 bucket

www.theregister.co.uk/2019/09/02/teletext_holidays_200k_call_recordings_s3_bucket/ Teletext Holidays managed to leave more than 200,000 customer phone call recordings exposed on an unsecured AWS server, according to reports. A total of 532,000 files were exposed on AWS servers belonging to Truly Travel, the company that trades as Teletext Holidays, of which 212,000 were recordings of live news.

Student surprise: malware masked as textbooks and essays

www.kaspersky.com/blog/back-to-school-malware-2019/28316/ We have written on numerous occasions about how easy it is to inadvertently pick up some nasty stuff when you try to download popular TV shows or game cheats. However, cybercriminals do not just limit themselves to entertainment products. You can also stumble upon a virus when looking for work- or study-related materials. This is particularly important to keep in mind as the academic year starts. That is because the cost of textbooks and other materials for K-12 and college students often leads to many looking for more affordable and free alternatives online.

Sodinokibi Ransomware Spreads via Fake Forums on Hacked Sites

www.bleepingcomputer.com/news/security/sodinokibi-ransomware-spreads-via-fake-forums-on-hacked-sites/ A distributor for the Sodinokibi Ransomware is hacking into WordPress sites and injecting JavaScript that displays a fake Q & A forum post over the content of the original site. This fake post contains an “answer” from the site’s “admin” that contains a link to the ransomware installer.

You might be interested in …

Daily NCSC-FI news followup 2021-02-13

Who is to blame for the malicious Barcode Scanner that got on the Google Play store? blog.malwarebytes.com/android/2021/02/who-is-to-blame-for-the-malicious-barcode-scanner-that-got-on-the-google-play-store/ In our last blog, Barcode Scanner app on Google Play infects 10 million users with one update, we wrote about a barcode scanner found on the Google Play store that was infected with Android/Trojan.HiddenAds.AdQR.. All initial signs led […]

Read More

Daily NCSC-FI news followup 2021-10-31

Network Scanning Traffic Observed in Public Clouds unit42.paloaltonetworks.com/cloud-network-scanning-traffic/ Tracking network scanning activities can help researchers understand which services are being targeted. By monitoring the origins of the scanners, researchers can also identify compromised endpoints. If a host belonging to a known organization suddenly starts to scan a part of the internet, it is a strong […]

Read More

Daily NCSC-FI news followup 2021-12-24

SFW! The Top N Cybersecurity Stories of 2021 (for small positive integer values of N) nakedsecurity.sophos.com/2021/12/24/sfw-the-top-n-cybersecurity-stories-of-2021-for-small-positive-integer-values-of-n/ And by totally SFW, we don’t just mean Suitable For Work, but also Something For the Weekend a double bonus if you’re on official duty over the holiday break and are looking for laid-back content that nevertheless counts as […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.