Categories
NCSC-FI News followup

Daily NCSC-FI news followup 2020-07-25

Will Garmin Pay $10m Ransom To End Two-Day Outage?

www.forbes.com/sites/barrycollins/2020/07/25/will-garmin-pay-10m-ransom-to-end-two-day-outage/ Garmin is reportedly being asked to pay a $10 million ransom to free its systems from a cyberattack that has taken down many of its services for two days. Lisäksi yle.fi/uutiset/3-11465640

Hackers actively exploit high-severity networking vulnerabilities

arstechnica.com/information-technology/2020/07/hackers-actively-exploit-high-severity-networking-vulnerabilities/ Hackers are actively exploiting two unrelated high-severity vulnerabilities that allow unauthenticated access or even a complete takeover of networks run by Fortune 500 companies and government organizations.

Russia’s GRU Hackers Hit US Government and Energy Targets

www.wired.com/story/russia-fancy-bear-us-hacking-campaign-government-energy/ A previously unreported Fancy Bear campaign persisted for well over a yearand indicates that the notorious group has broadened its focus.

Yhdysvaltalaiset viranomaiset menivät voimakeinoin sisälle Kiinan Houstonin-konsulaattiin

yle.fi/uutiset/3-11465379 Yhdysvaltalaisten viranomaisten on nähty menevän sisään Kiinan konsulaattiin Houstonissa käyttäen rakennuksen takaovea, kertoo uutistoimisto Reuters

Microsoft seizes control of domains used in phishing attacks

www.pandasecurity.com/mediacenter/adaptive-defense/microsoft-control-phishing-domains/ Compromised or malicious websites are a main channel for the propagation of malware infections for all kinds of devices. Simply avoiding dubious websites reduces your chances of being infected by malware, yet the real problem is often that we are unaware that we are running this risk

Ubiquiti, go write on the board 100 times, ‘I must validate input data before using it’… Update silently breaks IDS/IPS

www.theregister.com/2020/07/23/ubiquiti_borked_by_rules/ Unfortunately, from Friday to last night, a collection of rules ranging from worm and trojan detection to rogue external netblocks contained invalid data, which caused Ubiquiti’s device software to ignore those rules completely.

Leveraging Open Source Can be Powerful for Cybersecurity

securityintelligence.com/posts/open-source-cybersecurity/ Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force.

Five regular checks for Android

www.kaspersky.com/blog/five-regular-checks-for-android/36440/ To make sure that you remain in control of your data wealth, some regular maintenance is required think of it like brushing your teeth, only it’s your phone you need to clean. In this post, we talk about five regular safety and security checks for Android smartphones.

Spotify Security Hole Lets Strangers Into Your Family Account

www.forbes.com/sites/barrycollins/2020/07/23/spotify-security-hole-lets-strangers-into-your-family-account/ Spotify customers are complaining that strangers are breaking into their Family accounts, years after the problem was first raised with the music-streaming service.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.