Massachusetts General Hospital (MGH) announced that it learned of a privacy incident involving its Department of Neurology. MGH said that it learned on 24 June 2019 of an instance where someone gained unauthorized access to databases related to two computer applications used by its Neurology Department for research studies. Upon taking a closer look, MGH […]… Read More
The post Massachusetts General Hospital Warns of Privacy Incident appeared first on The State of Security.
Visa unveiled a suite of new security capabilities designed to help detect fraud and disrupt threats targeting financial institutions and merchants. At its U.S. Security Summit 2019, the multinational financial services corporation announced that the new capabilities will be available to all Visa clients at no additional cost or sign-up. The company specifically highlighted the […]… Read More
The post Visa Adds New Security Capabilities to Detect Fraud and Disrupt Threats appeared first on The State of Security.
A supermarket chain based in the Midwestern United States notified customers of a data incident that potentially involved their payment cards. On 14 August, Hy-Vee revealed it was investigating a security incident that affected its payment systems responsible for processing transactions at its fuel pumps, drive-thru coffee shops and restaurants. Hy-Vee, which operates 245 branches […]… Read More
The post Supermarket Chain Notifies Customers of Payment Card Data Incident appeared first on The State of Security.
Police recovered over $300,000 stolen by phishers from Spotslyvania County Public Schools in Spotslyvania County, Virginia. On 15 August, Virginia State Police announced that it had reclaimed over half the amount of money stolen in a phishing attack against the Spotslyvania County Public Schools. The law enforcement agency subsequently handed over checks totaling $347,010.39 to the Spotslyvania […]… Read More
The post Police Recovered $300K Stolen in Spotslyvania Schools Phishing Attack appeared first on The State of Security.
Researchers identified a large-scale cryptocurrency miner infection in which a new malware family called “Norman” took part. The Varonis Security Research team made the discovery while investigating a cryptominer infection at a mid-sized company. Here’s what they found through this effort: Almost every server and workstation was infected with malware. Most were generic variants of […]… Read More
The post New “Norman” Malware Took Part in Large-Scale Cryptominer Infection appeared first on The State of Security.
Fraudsters launched an attack campaign that distributed phishing emails designed to target the hotel industry in North America. In summer 2019, researchers at 360 Security Center discovered that bad actors had sent attack emails to financial personnel working at various hotels throughout North America. These emails informed recipients that their organizations had not paid for […]… Read More
The post Fraudsters Used Phishing Emails to Target Hotels in North America appeared first on The State of Security.
Digital attackers are using multiple compromised websites in order to distribute samples of the Troldesh ransomware family. Sucuri Security observed malicious emails and services like social media spreading a URL in the form of a PHP file. Once clicked, the URL downloaded a JScript file to a victim’s downloader. This file, which specifically targeted Windows […]… Read More
The post Compromised Websites Hosting Troldesh Ransomware Samples appeared first on The State of Security.
Many organizations are still struggling to fill out their digital security workforces. This task isn’t getting any easier with time, either. In a Tripwire-commissioned survey of 336 IT security professionals, four-fifths of respondents told Dimensional Research that they feel it’s gotten more difficult to hire skilled personnel since 2017. That’s a problem considering the fact […]… Read More
The post Ask the Experts: How Industrial Organizations Can Strengthen Their Security Posture appeared first on The State of Security.
Apple announced that it will be expanding the scope of its bug bounty program and increasing its maximum possible reward payout to $1 million. Ivan Krstić, Apple’s head of security engineering, made the announcement during a presentation on iOS and macOS security at Black Hat USA 2019. He revealed that Apple’s bug bounty program will […]… Read More
The post Apple Increases Maximum Bug Bounty Program Payout to $1M appeared first on The State of Security.
President Trump has signed an executive order (EO) that seeks to bolster the U.S. federal government’s digital security workforce. On 2 May, President Trump authorized the “Executive Order on America’s Cybersecurity Workforce.” This directive sets out various actions designed to strengthen the federal digital security workforce. For instance, it requires the Secretary of Homeland Security […]… Read More
The post President Trump Signs EO to Bolster Federal Digital Security Workforce appeared first on The State of Security.
An unprotected database made it possible for anyone on the web to view the personal and employment information of 13.7 million users. Security researcher and GDI Foundation member Sanyam Jain discovered the database and determined that it belonged to Ladders, a New York-based job recruitment site which specializes in high-end jobs. Jain then shared his […]… Read More
The post Unprotected Database Exposed 13.7M Users’ Employment Information appeared first on The State of Security.
A Washington federal court has received a $9.8 million settlement that would resolve a data breach class-action lawsuit filed against Eddie Bauer. Filed on 26 April, the proposed settlement is the product of two years of litigation between Eddie Bauer and Veridian Credit Union, a process which included an in-person mediation meeting held in February, […]… Read More
The post $9.8M Settlement to Eddie Bauer Data Breach Filed in Federal Court appeared first on The State of Security.
Security researchers found an unprotected database stored on the cloud that contained detailed information of over 80 million U.S. households. vpnMentor’s Noam Rotem and Ran Locar discovered the unprotected database hosted on a Microsoft cloud server during the course of a web mapping project. When they peered inside, they found that the asset contained 24 […]… Read More
The post Unprotected Database Exposed Details of Over 80 Million U.S. Households appeared first on The State of Security.
A digital fraudster posed as English actor and film producer Jason Statham to prey upon and steal money from star-struck users. A woman who asked not to be named said the scam began when someone posing as Statham contacted her while she was on a Facebook page dedicated to the actor. She thought it was […]… Read More
The post Fraudster Posed as Jason Statham to Prey Upon Star-Struck Users appeared first on The State of Security.
The current security state of industrial control systems (ICS) is a perplexing one. On the one hand, Kaspersky Lab found in a recent report that a majority of organizations (75 percent) regard ICS security as a major priority. On the other hand, organizations aren’t implementing the proper safeguards to secure their industrial control systems. The […]… Read More
The post Using Visibility to Navigate the Evolving Role of ICS Security appeared first on The State of Security.
The Washington legislature has passed a bill that effectively expands the state’s consumer data breach notification requirements. Previously, Washington-based organizations needed to notify consumers of a data breach only in the event that the security incident exposed users’ names in combination with their Social Security Numbers, driver’s license numbers, state ID numbers or financial account […]… Read More
The post Washington State Legislature Passes New Data Breach Law appeared first on The State of Security.
American online retailer Bodybuilding.com suffered a security incident that might have exposed customers’ personal information. In February 2019, Bodybuilding.com learned of an instance where unknown actors gained unauthorized access to its systems. The fitness platform responded by retaining a data forensics firm to investigate what happened. This effort, which concluded in April 2019, traced the […]… Read More
The post Bodybuilding.com Suffered Security Incident Potentially Involving Customer Info appeared first on The State of Security.
“123456” remains the most common password which digital criminals abuse to steal unsuspecting users’ sensitive information. On 21 April, the United Kingdom’s National Cyber Security Centre (NCSC) partnered with security researcher Troy Hunt to publish the top 100,000 passwords from Hunt’s Pwned Password service. Here are the top 20 passwords from this list: 123456 123456789 […]… Read More
The post “123456” Remains the World’s Most Breached Password appeared first on The State of Security.
Local and national weather forecast provider The Weather Channel suffered a ransomware attack that temporarily prevented it from going live on the air. Regular viewers got a surprise when they tuned into The Weather Channel on the morning of 18 April. They were expecting to watch “AMHQ,” the network’s live morning show which begins at […]… Read More
The post The Weather Channel Suffers Ransomware Attack appeared first on The State of Security.
Bad actors used a ransomware attack to target the Israeli offices of the customer engagement and digital intelligence company Verint. On 17 April, ZDNet received a screenshot taken by an employee who works at one of Verint’s Israeli offices. The screenshot shows what appears to be a warning message which the data intelligence firm displayed […]… Read More
The post Ransomware Attack Targeted Data Intelligence Firm Verint appeared first on The State of Security.
Navicent Health, a part of Central Georgia Health System, has disclosed that it suffered a data breach as the result of a digital attack. The second-largest hospital in Georgia and the only regional Level I Trauma Center, Navicent Health explains in a data breach notice that it learned of a digital attack involving some of […]… Read More
The post Navicent Health Discloses Data Breach as the Result of a Digital Attack appeared first on The State of Security.
Researchers observed bad actors using a spear phishing campaign to target government entities in Ukraine including military departments. In the beginning of 2019, FireEye Threat Intelligence analyzed an email sent out as part of this campaign. The email used “SPEC-20T-MK2-000-ISS-4.10-09-2018-STANDARD” as its subject line. It also spoofed the sender address so that it appeared to […]… Read More
The post Spear Phishing Campaign Targeted Ukraine Government Entities appeared first on The State of Security.
The ransom demands imposed by the new “RobbinHood” ransomware family increase $10,000 each day beginning on the fourth day following encryption. The creators of RobbinHood appear to be aiming their attacks at entire networks. When they’ve gained access to a target, they use their ransomware to encrypt as many computers as possible. They then drop […]… Read More
The post RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day appeared first on The State of Security.
The MuddyWater threat attack group is using a spam campaign to hijack victims’ computers and steal sensitive information. Discovered by Heimdal Security in early April, the campaign begins when malicious actors use social engineering techniques to trick a user into opening a malicious Microsoft Office document attached to a phishing email. The document contains VBA […]… Read More
The post MuddyWater Group Using Spam Campaign to Hijack Victims’ Computers appeared first on The State of Security.
Industrial control systems (ICS) security is an important concern for businesses in today’s world. Kaspersky Lab is well aware of this fact. It observed as much in its “The State of Industrial Cybersecurity 2018” report when three-quarters of respondents affirmed ICS security to be a top concern for their organization. But the Russian security firm […]… Read More
The post How to Build an Effective ICS Security Program appeared first on The State of Security.
Researchers have discovered that malicious actors leveraged the TRITON framework at a second critical infrastructure facility. In this particular attack, the threat actor maintained access to the target corporate networks for nearly a year before gaining access to the Safety Instrumented System (SIS) engineering workstation. They remained relatively quiet all the while as they worked […]… Read More
The post TRITON Framework Leveraged at a Second Critical Infrastructure Facility appeared first on The State of Security.
Indoor gardening system manufacturer AeroGrow has disclosed a data breach that involved customers’ payment card information. In a sample data breach notice obtained by the Office of Attorney General for the State of California, AeroGrow senior vice president of finance and accounting Grey H. Gibbs explains that the company learned of the security incident on […]… Read More
The post AeroGrow Discloses Data Breach of Customers’ Payment Card Information appeared first on The State of Security.
Security researchers have released a decryptor that enables victims of the Planetary ransomware family to recover their files for free. Released by Emsisoft, this decryptor requires a victim to have a copy of the ransom note. It’s not hard to find. Planetary ransomware, which earns its name for its use of planet-related file extensions including […]… Read More
The post Planetary Ransomware Victims Can Now Recover Their Files for Free appeared first on The State of Security.