Cyber Attacks, Threats, and Vulnerabilities
Black Lotus Labs® releases threat intelligence report showing newly discovered watering hole attack that targeted Ukrainian, Canadian organizations (PR Newswire) Black Lotus Labs, the threat intelligence arm of Lumen Technologies (NYSE: LUMN), today announced it has uncovered a cluster of compromised...
Lumen’s Black Lotus Labs flags ‘watering hole’ cyber threat (FierceTelecom) Watering hole attacks target websites by injecting a malicious function into a site's code, which the victims' machine then executes.
EtterSilent: the underground’s new favorite maldoc builder (Intel 471) The cybercrime underground often mimics behaviors that we see in everyday facets of life. Intel 471’s latest discovery is an example of one of these patterns: when a product takes off in the marketplace, users will rush to obtain it and find unique ways to use it in order to fit their needs.
Don’t Shortchange Your Organization’s Security With URL Shortener Services (Bishop Fox) URL shortening services can compromise system security and weaken the attack surface. Protect infrastructure and critical data by not using these services.
Facebook data on 533 million users dumped on hacking forum (Computing) The company says this is old data previously reported in 2019
Dumped Facebook Users' Personal Information Ripe for Cyberattacks (Channel Futures) The cell phone numbers and other personal information of 533 million Facebook users from 106 countries has been posted online.
The dark web could already have your password. Here's how to check (CNET) Don't wait for a data breach to protect your most valuable personal information. We'll help you defend yourself.
7.3 Million Aussies Were Hit By The Facebook Data Breach – Here’s How Worried You Need To Be (Pedestrian TV) Australia: You’ve been Zucc'd.
Facebook data breach: Mark Zuckerberg uses Signal; phone number leaked (Business Today) Facebook CEO Mark Zuckerberg's phone number was among the leaked data of 533 million Facebook users
Leak of 500m Facebook users’ data re-opens old wounds (Silicon Republic) The social network said the data leaked over the weekend stems from an old issue but Ireland’s data protection watchdog has got involved.
Facebook leak: Irish regulator probes 'old' data dump (BBC News) The Irish regulator is checking that an "old" leak of 500 million users' data is what Facebook says.
Did Facebook's business model make it an easy target for cybercriminals? (SC Media) Some researchers argue that the situation showcases why Facebook must revisit how it handles and secures personal information.
Facebook Leaked the Data of 533 Million Users and Didn’t Tell Anyone (Vice) Another day, another massive privacy scandal nobody will do much about.
The Cybersecurity 202: A massive Facebook breach underscores limits to current data breach notification laws (Washington Post) Lawmakers and privacy experts are slamming Facebook for its handling of a leak of more than 500 million users' personal information that was posted online for free.
Bad Bots Keep Their Eyes on the Money (Fintech Singapore) Today’s fraudsters have access to enormous resources to pretend to be a whole horde of people, and the options at their disposal are nearly limitless.
Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses (Verizon) The Verizon Business Mobile Security Index 2021 reveals that the pandemic may have left many businesses vulnerable and open to cyber criminals
We Shouldn't Transfer: Getting End-Users to Give Over Credentials (Avanan) Hackers are leveraging WeTransfer, a popular file-sharing service, to get credentials.
Tax Season: Criminals Play the Numbers Game Too (Akamai) Criminals love tax season. The stress and urgency surrounding this time of year makes the victim pool highly vulnerable to various types of schemes. In addition to phishing, tax season is also the time of year when criminals focus their...
The SolarWinds hack timeline: Who knew what, and when? (CSO Online) Impact, detection, response, and ongoing fallout from the attack on SolarWinds' Orion remote IT management software.
Sophos identifies connection between Mount Locker and Astro Locker team ransomware (Security Magazine) Sophos published a new report on a recently uncovered connection between the Mount Locker ransomware group and a new group, called “Astro Locker Team.”
DMV emissions testing still offline following vendor cyber-attack (WFSB) The state Department of Motor Vehicles emissions testing is still offline after a cyber-attack last week.
Cyber Insurance Firm Suffers Sophisticated Ransomware Cyber Attack; Data Obtained May Help Hackers Better Target Firm’s Customers (CPO Magazine) One of the largest insurance firms in the U.S. CNA Financial was reportedly hit by a “sophisticated cybersecurity attack” on March 21, 2021. The cyber attack disrupted the company’s employee and customer services for three days as the company shut down “out of an abundance of caution” to prevent further compromise.
Cybersecurity Attack (Customized Business Insurance | CNA Insurance) On March 21, 2021, CNA determined that it sustained a sophisticated cybersecurity attack. The attack caused a network disruption and impacted certain CNA systems.
Accellion Vulnerabilities, Cyberattacks and Victims: Customer List and Status Updates (MSSP Alert) The Accellion cyberattack continues to impact partners and customers worldwide. Here’s a regularly updated list of Accellion supply chain victims and what happened.
Report: Office Depot Europe Exposed Customer Data Online (Website Planet) On March 3rd, 2021 security researcher Jeremiah Fowler and the Website Planet research team discovered a non-password protected Elasticsearch
Third-party security breach compromises data of Singapore job-matching service (ZDNet) Job-matching institute e2i says the personal details of 30,000 individuals may have been illegally accessed due to a malware breach that targeted an "appointed third-party vendor", adding that it was notified of the incident three weeks ago on March 12.
Cloudflare says new hCaptcha bypass doesn't impact its implementation (The Record by Recorded Future) Web infrastructure and website security provider Cloudflare told The Record last week that a recent academic paper detailing a method to bypass the hCaptcha image-based challenge system does not impact its implementation.
Security Patches, Mitigations, and Software Updates
VMware Patches Critical Flaw in Carbon Black Cloud Workload (SecurityWeek) VMWare fixes a serious URL-handling vulnerability in the Carbon Black administrative interface and warns of authentication bypass and potential code execution risks.
SecureDrop Workstation Gets Post-Audit Security Refresh (SecurityWeek) A third-party audit financed by the New York Times discovers a high-risk vulnerability but overall gives Securedrop Workstation a positive security bill of health.
New Survey Finds Enterprise Password Security is as Flimsy as a Sticky Note (PR Newswire) A majority of Americans are using sticky notes to store their work-related passwords, and most of them admit to having lost these notes,...
Financial Sector Remains Most Targeted by Threat Actors: IBM (SecurityWeek) Adversaries have intensified the targeting of manufacturing and energy sectors in 2020, while decreasing focus on retail and telecommunications.
Industry Research Reveals ‘Cloud Data Protection Is the New Norm’ (Zerto) Extending On-premises Data Protection with Cloud Backup Solutions Is Gaining Momentum; ‘SaaS Disconnect’ Remains A Concern
ThreatQuotient Looks to Solve The Cyber Problem, Raises $22.5M (CrunchBase) Reston, Virginia-based ThreatQuotient closed a new $22.5 million round of funding as it looks to grow more than 50 percent this year while adding new products to its offerings.
Northrop to Sustain USAF’s Cyber Operations Platform (ExecutiveBiz) Northrop Grumman has secured a five-year, $42.5 million reimbursement task order to sustain a platfo
Centrify Brings Privileged Identity Leadership in Support of First-Ever ‘Identity Management Day’ April 13, 2021 (Centrify) Centrify, a leading provider of modern privileged access management (PAM) solutions, today announced it is bringing its established leadership in privileged identity management to support the first-ever ‘Identity Management Day,’ an annual awareness event that will take place on the second Tuesday in April each year.
RangeForce Partners with Black Cybersecurity Association to Create Career Advancement Opportunities (BusinessWire) The partnership will help BCA members acquire new skills for career advancement and new job opportunities using the RangeForce platform.
CrowdStrike: Time To Buy This Cybersecurity Leader (Seeking Alpha) Cloud and cybersecurity spend are expected to increase significantly over the course of the next few years, benefiting the leaders of the sector.
Zscaler: A Rebound Opportunity Is Knocking (Seeking Alpha) Shares of Zscaler have crashed more than 25% relative to their all-time highs above $230.
ThetaRay Names Dagan Osovlansky as Chief Product Officer (THETARAY) Industry Veteran Brings 20 Years of Banking/FinTech Product Development Experience
QCI Expands Sales and Marketing Team to Accelerate Growth and Advance Enterprise Adoption of Quantum Computing (GlobeNewswire) Company Appoints Two Highly Successful Sales and Marketing Leaders; Chief Revenue Officer, Dave Morris; VP of Marketing, Rebel Brown
AWS Leader Teresa Carlson Leaving Amazon for Splunk (FedScoop) After more than a decade leading Amazon Web Services’ public sector business, legendary government IT leader Teresa Carlson is joining Splunk‘s leadership team as president and chief growth officer.
Award-winning CSO Andy Ellis is Named Operating Partner at YL Ventures (GlobeNewswire) Respected cybersecurity industry leader and longtime Akamai CSO brings decades of experience to YL Ventures to support the success of its portfolio companies’ growth
Products, Services, and Solutions
New infosec products of the week: April 2, 2021 (Help Net Security) The featured cybersecurity vendors this week include: Solvo, Elastic, Threat Stack, Siemens, McAfee, HID Global, and Sysdig.
LogRhythm Releases Version 7.7 of NextGen SIEM Platform (PRWeb) LogRhythm, the company powering today’s security operations centers (SOCs), today announced the launch of version 7.7 of the LogRhythm NextGen SIEM Platform.
BitSight and Kovrr Announce Financial Quantification for Enterprise Cyber Risk (PR Newswire) BitSight, the Standard in Security Ratings, and Kovrr, a leader in data-driven cyber risk modeling, are furthering their partnership and today...
Jumio Collaborates With Microsoft to Deliver on Its Vision of Decentralized Digital Identity (Yahoo) Jumio, a leading provider of AI-powered end-to-end identity verification and eKYC solutions, today announced the company is collaborating with Microsoft for the rollout of its Azure Active Directory (Active AD) verifiable credentials to help provide self-service enrollment and fast onboarding of remote users.
AU10TIX Joins Forces with Microsoft To Create a More Trustworthy Identity Ecosystem in New Era of Remote and Hybrid Work (PR Newswire) AU10TIX, a global leader in automated identity verification, today announced that it is partnering with Microsoft for the rollout of Microsoft...
Socure to Provide Identity Verification for Microsoft Azure Active Directory Verifiable Credentials (BusinessWire) Socure, a leader in 100% digital identity trust, today announced the company will provide identity verification services for remote onboarding for ind
Onfido Collaborates with Microsoft to bring the Future of Reusable Identity One Step Closer (Onfido) Onfido’s trusted identity verification to power onboarding for Microsoft’s new digital wallet for identity credentials
SAP and Onapsis Proactively Notify and Help Customers Protect Mission-Critical Applications from Active Cyber Threats (BusinessWire) SAP and Onapsis Partner in Advanced Cyber Threat Intelligence Capabilities to Mitigate Active Threats Against Unprotected SAP Applications
Announcing Zero Trust Authentication for Managed Devices and BYOD (Beyond Identity) Beyond Identity Now Integrates With Jamf, Microsoft Intune, and VMware Workspace ONE UEM, Collecting Additional Device Attributes to Further Expand Risk-Based Authentication Decisions
The Beer Store Chooses Comodo’s Industry-Leading “Auto-Containment” Technology to Protect Against Both Known and Unknown Zero-Day Threats (Yahoo) The Beer Store, a California-based distribution and retail chain with over 450 locations and 10 distribution centers, chose to implement Comodo’s Advanced Endpoint Protection (AEP) based on its ind...
Technologies, Techniques, and Standards
CMMC Accreditation Body Launches Industry Advisory Council Backed by Thought Leaders from across the DIB (BusinessWire) The CMMC Accreditation Body (CMMC-AB), the sole authoritative source for operationalizing CMMC assessments and training by the U.S. Department of Defe
Network security often does not view control system devices and the process as their problem (Control Global) Industrial, manufacturing, and other organizations are in business to manufacture and/or distribute products.
Design and Innovation
SK Telecom applies quantum cryptographic communication technology to IP equipment (Aju Daily) SK Telecom, a top mobile carrier in South Korea, opened the way for the wider use of its security solution by applying quantum cryptographic communication technology to corporate IP equipment such as routers and switches. Companies with no dedicated networks can use teleco...
Spy Museum exhibit displays mysterious machines that changed history (WBAL) Never-before-seen artifacts that are groundbreaking in code-breaking are part of a pop-up exhibit at the International Spy Museum in Washington.
Federal cybersecurity requirements in higher education (Federal News Network) Federal News Network collaborated with Scott Edwards, CEO of Summit 7, to create an FAQ to help guide higher education institutions in their CMMC compliance journey.
Whitehouse ISD students join newly formed IT ‘Cyber Squad’ (KLTV) Whitehouse ISD students now have a chance to squad up and learn new ways of interacting with technology.
Scholarship program to help aspiring NYC cyber pros hit hard by COVID (SC Media) The NYC Economic Development Corporation & Fullstack Academy announced a scholarship program for lower-income individuals affected by COVID.
Legislation, Policy, and Regulation
Russia extends punitive Twitter slowdown until mid-May (Reuters) Russia said on Monday it would extend a punitive slowdown of Twitter until May 15 though it acknowledged the U.S. social media company had speeded up deletion of banned content.
China as a ‘cyber great power’: Beijing’s two voices in telecommunications (Brookings) While Chinese government and commercial messaging on telecommunications aimed at foreign audiences demands adherence to market principles, internal Chinese discourse warns of the risks of reliance on foreign technology.
The 2021 Cyber Threat Will Drive Stronger Alliances (The Cipher Brief) Cipher Brief Expert and former Secretary for Homeland Security Michael Chertoff shares his thoughts on today's cyber threats.
Why We Don’t Need Another Cyber ‘Wake-Up Call’ (Governing) We've had plenty already, yet we react the same way to every new attack. The question is, are we awake? We need to do a better job of learning from our failures and preparing for the attacks to come.
Encryption Has Never Been More Essential—or Threatened (Wired) As we communicate more digitally, governments encroach more on our privacy. End-to-end encryption cannot be taken for granted.
Surveillance Companies Eyed by US Government (DesignNews) While not specifically in the telecom market, Chinese-based Hikvision and Dahua make the Entity List. Is it justified?
Avoiding 5G Telecommunications or Surveillance Equipment Manufactured by Adversaries (ClearanceJobs) The National Defense Strategy (NDS) per the 2019 National Defense Authorization Act (NDAA) found that the return of competition between powers is the most critical challenge the U.S. faces.
After A Major Hack, U.S. Looks To Fix A Cyber 'Blind Spot' (NPR.org) By law, the US government can't monitor domestic Internet traffic. Suspected Russian hackers exploited this blind spot by disguising their origins and working through unwitting US companies.
Biden to Nominate Ronald Moultrie for DoD Intelligence and Security Post (Meritalk) President Biden intends to nominate Ronald Moultrie, a national security veteran who helped create the Navy’s digital roadmap, to serve as under secretary for Intelligence and Security at the Department of Defense, the White House announced April 2.
Litigation, Investigation, and Law Enforcement
Supreme Court vacates lower court decision that ruled Trump can't block Twitter followers (Axios) The court declared the case moot now that Trump is out of office.
Justice Thomas argues for making Facebook, Twitter and Google utilities (Protocol) Thomas argues that some digital platforms are "sufficiently akin" to common carriers like telephone companies.
Dutch man gets two years in prison for hijacking 13,762 online store accounts (The Record by Recorded Future) A Dutch man was sentenced last week to 27 months in prison and a €10,000 ($11,800) fine for breaking into 13,762 accounts at Dutch online stores.
Individual Pleads Guilty in Brooklyn Federal Court to Extorting Cryptocurrency from Startup Company (US Department of Justice) Earlier today, in federal court in Brooklyn, Michael Hlady pled guilty before United States Chief District Court Judge Margo K. Brodie to conspiring to extort a startup company for millions of dollars in the cryptocurrency Ether (ETH). When sentenced, Hlady faces up to 20 years in prison, as well as a fine.
TikTok Privacy Settlement Standoff Puts Focus on Value of Personal Data (Wall Street Journal) Lawyers are in gridlock over a proposed $92 million settlement of TikTok users’ claims that it illegally collected their data, disagreeing on the size of the payout and how to alert people that they are entitled to cash.
Objectors To $92M TikTok Privacy Deal Push For Arbitration (Law360) Nearly 1,000 users accusing TikTok of biometric privacy violations as part of multidistrict litigation have urged an Illinois federal court to reject a $92 million settlement in the case, arguing that the agreed-upon deal blocks their right to individually arbitrate their claims.
More Students Hit Testing Software Co. Over Facial Scans (Law360) Respondus Inc. got hit in federal court Friday with yet another lawsuit claiming the online testing company's automated proctoring program collects and uses Illinois test-takers' biometric data without first obtaining their informed consent.