Massachusetts General Hospital (MGH) announced that it learned of a privacy incident involving its Department of Neurology. MGH said that it learned on 24 June 2019 of an instance where someone gained unauthorized access to databases related to two computer applications used by its Neurology Department for research studies. Upon taking a closer look, MGH […]… Read More
The post Massachusetts General Hospital Warns of Privacy Incident appeared first on The State of Security.
It’s no secret that there are a lot of websites on the internet hosting malicious content whether they be phishing pages, scams or malware itself. Every day we hear of new attacks, there’s a common denominator of either a user having clicked on a link to a fraudulent website or a site having played host […]… Read More
The post Block newly-registered domains to reduce security threats in your organisation appeared first on The State of Security.
Visa unveiled a suite of new security capabilities designed to help detect fraud and disrupt threats targeting financial institutions and merchants. At its U.S. Security Summit 2019, the multinational financial services corporation announced that the new capabilities will be available to all Visa clients at no additional cost or sign-up. The company specifically highlighted the […]… Read More
The post Visa Adds New Security Capabilities to Detect Fraud and Disrupt Threats appeared first on The State of Security.
What if your job was to break things repeatedly in order to make them work better? Sounds like the dream of every curious six-year old, but it’s actually an emerging software engineering trend based in the transition from devops to devsecops. It’s designed to test systematic limitations with the goal of improving security and performance […]… Read More
The post Embrace the Chaos: An Emerging Trend in Software Engineering? appeared first on The State of Security.
A supermarket chain based in the Midwestern United States notified customers of a data incident that potentially involved their payment cards. On 14 August, Hy-Vee revealed it was investigating a security incident that affected its payment systems responsible for processing transactions at its fuel pumps, drive-thru coffee shops and restaurants. Hy-Vee, which operates 245 branches […]… Read More
The post Supermarket Chain Notifies Customers of Payment Card Data Incident appeared first on The State of Security.
Police recovered over $300,000 stolen by phishers from Spotslyvania County Public Schools in Spotslyvania County, Virginia. On 15 August, Virginia State Police announced that it had reclaimed over half the amount of money stolen in a phishing attack against the Spotslyvania County Public Schools. The law enforcement agency subsequently handed over checks totaling $347,010.39 to the Spotslyvania […]… Read More
The post Police Recovered $300K Stolen in Spotslyvania Schools Phishing Attack appeared first on The State of Security.
A biometrics system used to secure more than 1.5 million locations around the world - including banks, police forces, and defence companies in the United States, UK, India, Japan, and the UAE - has suffered a major data breach, exposing a huge number of records.
The post More than a million people have their biometric data exposed in massive security breach appeared first on The State of Security.
Researchers identified a large-scale cryptocurrency miner infection in which a new malware family called “Norman” took part. The Varonis Security Research team made the discovery while investigating a cryptominer infection at a mid-sized company. Here’s what they found through this effort: Almost every server and workstation was infected with malware. Most were generic variants of […]… Read More
The post New “Norman” Malware Took Part in Large-Scale Cryptominer Infection appeared first on The State of Security.
On the last day of July, MITRE released its most recent update to the ATT&CK framework. The ATT&CK framework is a curated knowledge base of tactics, techniques, software, that adversarial groups have leveraged when compromising enterprise systems. The July 2019 update is relatively minor compared to the April 2019 update, which saw a new tactic […]… Read More
The post MITRE ATT&CK July 2019 Update appeared first on The State of Security.
Fraudsters launched an attack campaign that distributed phishing emails designed to target the hotel industry in North America. In summer 2019, researchers at 360 Security Center discovered that bad actors had sent attack emails to financial personnel working at various hotels throughout North America. These emails informed recipients that their organizations had not paid for […]… Read More
The post Fraudsters Used Phishing Emails to Target Hotels in North America appeared first on The State of Security.
Digital attackers are using multiple compromised websites in order to distribute samples of the Troldesh ransomware family. Sucuri Security observed malicious emails and services like social media spreading a URL in the form of a PHP file. Once clicked, the URL downloaded a JScript file to a victim’s downloader. This file, which specifically targeted Windows […]… Read More
The post Compromised Websites Hosting Troldesh Ransomware Samples appeared first on The State of Security.
Apple announced that it will be expanding the scope of its bug bounty program and increasing its maximum possible reward payout to $1 million. Ivan Krstić, Apple’s head of security engineering, made the announcement during a presentation on iOS and macOS security at Black Hat USA 2019. He revealed that Apple’s bug bounty program will […]… Read More
The post Apple Increases Maximum Bug Bounty Program Payout to $1M appeared first on The State of Security.
An unprotected database made it possible for anyone on the web to view the personal and employment information of 13.7 million users. Security researcher and GDI Foundation member Sanyam Jain discovered the database and determined that it belonged to Ladders, a New York-based job recruitment site which specializes in high-end jobs. Jain then shared his […]… Read More
The post Unprotected Database Exposed 13.7M Users’ Employment Information appeared first on The State of Security.
Human nature has shown that people re-use passwords, at least for non-work accounts that aren’t requiring quarterly changes. How can it affect your current security that you’ve reused an old password from 2012? Surprisingly, quite a lot. Hashed passwords and the plain text equivalent from a breached site can be paired with your then-username. Hackers […]… Read More
The post World Password Day: Using a Passphrase to Strengthen Your Security appeared first on The State of Security.
Security researchers found an unprotected database stored on the cloud that contained detailed information of over 80 million U.S. households. vpnMentor’s Noam Rotem and Ran Locar discovered the unprotected database hosted on a Microsoft cloud server during the course of a web mapping project. When they peered inside, they found that the asset contained 24 […]… Read More
The post Unprotected Database Exposed Details of Over 80 Million U.S. Households appeared first on The State of Security.
A digital fraudster posed as English actor and film producer Jason Statham to prey upon and steal money from star-struck users. A woman who asked not to be named said the scam began when someone posing as Statham contacted her while she was on a Facebook page dedicated to the actor. She thought it was […]… Read More
The post Fraudster Posed as Jason Statham to Prey Upon Star-Struck Users appeared first on The State of Security.
What I’ve found throughout the years is that the only constant in life is the fact that everything changes and changes frequently. I can’t even get a consistent scenery on my way to work longer than a couple of weeks before something is different! At the same time, the world of technology is in constant […]… Read More
The post Three Levels of Change: The Good, the Bad and the Approved appeared first on The State of Security.
American online retailer Bodybuilding.com suffered a security incident that might have exposed customers’ personal information. In February 2019, Bodybuilding.com learned of an instance where unknown actors gained unauthorized access to its systems. The fitness platform responded by retaining a data forensics firm to investigate what happened. This effort, which concluded in April 2019, traced the […]… Read More
The post Bodybuilding.com Suffered Security Incident Potentially Involving Customer Info appeared first on The State of Security.
“123456” remains the most common password which digital criminals abuse to steal unsuspecting users’ sensitive information. On 21 April, the United Kingdom’s National Cyber Security Centre (NCSC) partnered with security researcher Troy Hunt to publish the top 100,000 passwords from Hunt’s Pwned Password service. Here are the top 20 passwords from this list: 123456 123456789 […]… Read More
The post “123456” Remains the World’s Most Breached Password appeared first on The State of Security.
Local and national weather forecast provider The Weather Channel suffered a ransomware attack that temporarily prevented it from going live on the air. Regular viewers got a surprise when they tuned into The Weather Channel on the morning of 18 April. They were expecting to watch “AMHQ,” the network’s live morning show which begins at […]… Read More
The post The Weather Channel Suffers Ransomware Attack appeared first on The State of Security.
Bad actors used a ransomware attack to target the Israeli offices of the customer engagement and digital intelligence company Verint. On 17 April, ZDNet received a screenshot taken by an employee who works at one of Verint’s Israeli offices. The screenshot shows what appears to be a warning message which the data intelligence firm displayed […]… Read More
The post Ransomware Attack Targeted Data Intelligence Firm Verint appeared first on The State of Security.
A person recently asked me if it was possible to implement ISO 27001 using a specific project management software product. They used the tool in the past to define project plans and make project reviews. While I told them this is entirely possible, the truth is one can implement ISO 27001 even without a project […]… Read More
The post Establishing Information Security in Project Management appeared first on The State of Security.
Navicent Health, a part of Central Georgia Health System, has disclosed that it suffered a data breach as the result of a digital attack. The second-largest hospital in Georgia and the only regional Level I Trauma Center, Navicent Health explains in a data breach notice that it learned of a digital attack involving some of […]… Read More
The post Navicent Health Discloses Data Breach as the Result of a Digital Attack appeared first on The State of Security.
Researchers observed bad actors using a spear phishing campaign to target government entities in Ukraine including military departments. In the beginning of 2019, FireEye Threat Intelligence analyzed an email sent out as part of this campaign. The email used “SPEC-20T-MK2-000-ISS-4.10-09-2018-STANDARD” as its subject line. It also spoofed the sender address so that it appeared to […]… Read More
The post Spear Phishing Campaign Targeted Ukraine Government Entities appeared first on The State of Security.
The ransom demands imposed by the new “RobbinHood” ransomware family increase $10,000 each day beginning on the fourth day following encryption. The creators of RobbinHood appear to be aiming their attacks at entire networks. When they’ve gained access to a target, they use their ransomware to encrypt as many computers as possible. They then drop […]… Read More
The post RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day appeared first on The State of Security.
The annual Scalar Security Study, published in February 2019 and conducted by IDC Canada, identified a new normal across the threat landscape: cybersecurity incidents, be it exfiltration, infiltration or denial of service, occur on a regular basis. Focused on small, midsize and large organizations in Canada, the study confirms that intrusions are inevitable and moreover […]… Read More
The post The Path to Cyber Resilience: Takeaways from the Scalar 2019 Security Study appeared first on The State of Security.
A British man has been jailed for over six years after exploiting ad networks on pornographic websites to spread malware onto innocent users' computers.
The post High-rolling hacker jailed after launching malware attacks via websites appeared first on The State of Security.
The MuddyWater threat attack group is using a spam campaign to hijack victims’ computers and steal sensitive information. Discovered by Heimdal Security in early April, the campaign begins when malicious actors use social engineering techniques to trick a user into opening a malicious Microsoft Office document attached to a phishing email. The document contains VBA […]… Read More
The post MuddyWater Group Using Spam Campaign to Hijack Victims’ Computers appeared first on The State of Security.
Indoor gardening system manufacturer AeroGrow has disclosed a data breach that involved customers’ payment card information. In a sample data breach notice obtained by the Office of Attorney General for the State of California, AeroGrow senior vice president of finance and accounting Grey H. Gibbs explains that the company learned of the security incident on […]… Read More
The post AeroGrow Discloses Data Breach of Customers’ Payment Card Information appeared first on The State of Security.
A staggering 590,497 resumes have leaked from poorly-secured Chinese companies in just the last three months.
The post Unsecured databases found leaking half a billion resumes on the net appeared first on The State of Security.