NCSC-FI News followup

Daily NCSC-FI news followup 2020-03-04

Are our police forces equipped to deal with modern cybercrimes? You should have asked for the presence of a digital detective, Karen said when I told her what happened at the police station. I had accompanied a neighbor, who is a small business owner, that had been hit with ransomware and wanted to file a report. After listening to his story, the police officer at the desk asked if my neighbor had a description of the perpetrator. I may have groaned.. To meet a growing demand for specialized experts, the police force will need a good deal of extra funds and staff. The cost of failing to adequately meet these demands may result in heavier losses than society can afford.. At least every police station or sheriffs office should have one digital expert available to at least take in reports of cybercrimes.. If this is not an achievable goal, set up an easy-to-use site to report cybercrimes online, where a special department of digital experts can do a triage, spot trends, and involve other departments where that is beneficial.

Valkohattuhakkeri voidaan kokea uhkaavana Pelko estää yrityksiä reagoimasta haavoittuvuuksiin Tietoturvatutkija Laura Kankaalan mukaan joissain yrityksissä ei vieläkään haluttaisi saattaa tietoturva-aukkoja päivänvaloon.. Kankaala kehottaa yrityksiä kommunikoimaan ulospäin väylät, joiden kautta haavoittuvuuksista voidaan ilmoittaa vastuullisesti. Yritysten tulisi lisäksi kehittää selkeät, sisäiset prosessit, joiden mukaan haavoittuvuustilanteissa toimitaan.. Prosessit tulisi saattaa kuntoon niin, että kun haavoittuvuus löydetään, niin se korjataan. Silloin ei ole enää syytä mennä tolaltaan tai pelätä maineensa menettämistä, Kankaala sanoo.

Oikotie varoittaa: Varo petollista tekstiviestiä Oikotien nimissä lähetetään huijaustekstiviestejä. Älä klikkaa viestissä olevaa linkkiä.

State Department pledges $8 million more in cybersecurity aid to Ukraine The State Department on Tuesday announced an additional $8 million in cybersecurity funding for Ukraine, whose electric utilities sector has at least twice been struck by Russia-linked hackers in recent years. One of those cyberattacks, in 2015, plunged a quarter of a million Ukrainians into darkness.. Ukraine was one of several allies to join the U.S. in blaming the Russian government for cyberattacks on thousands of websites in the Eurasian country of Georgia last October. Moscow denied involvement in the attacks.

Cyber Threats 2019: A Year in Retrospect In 2019, the cyber threat landscape became increasingly complex due to the proliferation of financially motivated cyber activity, intelligence operations navigating the currents of powerful interests and international politics, and information operations attempting to manipulate the news agenda.. PDF:

Warning over ‘hidden apps’ as mobile malware attacks increase – and get sneakier According to figures in the newly released McAfee Mobile Threat Report, the total number of detections for different types of mobile malware reached over 35 million during the final quarter of 2019, representing a jump of 10 million detections compared with 2018.. PDF:

Academics find 30 file upload vulnerabilities in 23 web apps, CMSes, and forums Through the use of an automated testing toolkit, a team of South Korean academics has discovered 30 vulnerabilities in the file upload mechanisms used by 23 open-source web applications, forums, store builders, and content management systems (CMSes).. When present in real-world web apps, these types of vulnerabilities allow hackers to exploit file upload forms and plant malicious files on a victim’s servers.. These files could be used to execute code on a website, weaken existing security settings, or function as backdoors, allowing hackers full control over a server.

Securing Content Management Systems The security of external-facing infrastructure is critical for organisations when considering the security of their network as a whole. Even if external-facing infrastructure does not host sensitive information, there is still a significant risk to the reputation of organisations if external-facing infrastructure is tampered with.. Security vulnerabilities within content management systems (CMS) installed on web servers of organisations are often exploited by adversaries. Once a CMS has been compromised, the web server can be used as infrastructure to facilitate targeted intrusion attempts.. This document outlines strategies for identifying and minimising the potential risk to web servers using CMS. The intended audience is individuals responsible for developing and securing websites or web applications using CMS.

Measuring Security Risk in a Medical IoT World The medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks.. When hospitals classify vulnerabilities, they should match the vulnerabilities with information about actual workflows, service delivery of the devices and threats that could lead to a compromise. In other words, security teams should consider the potential clinical and organizational impacts.

Singapore to introduce security label for smart home devices Singapore says it will launch the Cybersecurity Labelling Scheme for home routers and smart home hubs, as part of efforts to increase consumer awareness on using secured products and urge manufacturers to deploy additional cybersecurity measures.

Critical Netgear Bug Impacts Flagship Nighthawk Router Netgear is warning users of a critical remote code execution bug that could allow an unauthenticated attacker to take control of its Wireless AC Router Nighthawk (R7800) hardware running firmware versions prior to The warnings, posted Tuesday, also include two high-severity bugs impacting Nighthawk routers, 21 medium-severity flaws and one rated low.

Ransomware Attackers Use Your Cloud Backups Against You Backups are one the most, if not the most, important defense against ransomware, but if not configured properly, attackers will use it against you.. When Maze finds backups stored in the cloud, they attempt to obtain the cloud storage credentials and then use them to restore the victim’s data to servers under the attacker’s control.. “Yes, we download them. It is very useful. No need to search for sensitive information, it is definitely contained in backups. If backups in the cloud it is even easier, you just login to cloud and download it from your server, full invisibility to “data breach detection software”. Clouds is about security, right?”

Microsoft OneNote Used To Sidestep Phishing Detection A phishing campaign was recently discovered leveraging OneNote, Microsofts digital notebook that automatically saves and syncs notes, to bypass detection tools and download malware onto victims systems.. The attacker was utilizing OneNote as a way to easily experiment with various lures that either delivered the credential-stealing Agent Tesla keylogger or linked to a phishing page or both. The attack first started with an email to victims that contained a link to the OneNote document.

Verisign, Amazon patch zero-day vulnerability that utilized homoglyph characters Verisign has fixed an issue that could have allowed attackers to register bogus domains by using homoglyphs in place of more common characters, due to research from California-based security firm Soluble.

Download this update from Oh, sorry, that was malware on a hijacked sub-domain. Oops Lax DNS leaves door wide open for miscreants to impersonate Windows giant on its own websites. In short, the Windows giant allowed hundreds of sub-domains at least 670 on its big-name,,, and properties to potentially fall into the hands of miscreants who could have commandeered them for phishing and malware distribution.

Scam call centre owner in custody after BBC investigation

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.