Category Archives: Breaking News

#deepweb | Slate’s Use of Your Data

Source: National Cyber Security – Produced By Gregory Evans By clicking “Agree,” you consent to Slate’s Terms of Service and Privacy Policy and the use of technologies such as cookies by Slate and our partners to deliver relevant advertising on our site, in emails and across the Internet, to personalize content and perform site analytics. […]

#nationalcybersecuritymonth | NCSAM is Over, But Don’t Let Cybersecurity Fade to Black

Source: National Cyber Security – Produced By Gregory Evans This Halloween season, we’ve explored the deepest, darkest corners of cyberspace in our National Cybersecurity Awareness Month (NCSAM) blog series—from cyber spooks and digital demons to deathly data breaches and compliance concerns. Our panel of cybersecurity experts assembled to tell you the spookiest things they’ve seen […]

#cybersecurity | #hackerspace | Maze Ransomware Exploiting Exploit Kits

Source: National Cyber Security – Produced By Gregory Evans Cybercrime has never been one to hem in tactics with ideology or rules. Rather, malware operators are known to use what works and then modify code to continue to work. By “work,” we mean that the code does what it is supposed to; for information stealers, […]

#cybersecurity | #hackerspace | Active Directory Fix-It Guide – Security Boulevard

Source: National Cyber Security – Produced By Gregory Evans IT admins have long been the unofficial repair technicians of the enterprise. However, instead of hammers and wrenches, the tool kit of the IT admin contains servers, cables, and software tools. Unfortunately, one of the most popular IT admin tools, Microsoft® Active Directory® (AD), isn’t working […]

#infosec | Amazon Doorbell Camera Lets Hackers Access Household Network

Source: National Cyber Security – Produced By Gregory Evans A vulnerability detected in Amazon doorbell cameras made it possible for hackers to gain access to the owner’s household computer network. The weakness in the Ring Video Doorbell Pro IoT device was discovered by researchers at Bitdefender in June of this year. Researchers found that the credentials of […]

Gartner Says the Future of Network Security Lies with SASE

Source: National Cyber Security – Produced By Gregory Evans Cloud services and networking are driving the concept of digital businesses, yet traditional networking and cybersecurity architectures are far from meeting the demands of the digital business. Gartner’s “The Future of Network Security Is in the Cloud” report spells out the potential for the transformation of […]

#hacking | Simple Yet Effective, Raccoon Malware Making Inroads among Cyber Criminals

Source: National Cyber Security – Produced By Gregory Evans That’s quite a track record for a piece of malware dismissed by some for having a relatively limited feature set. Despite the reputation issues, Raccoon is a reliable niche weapon that offers a way for nontechnical attackers to get up and running quickly. That’s a big […]

#cybersecurity | #infosec | Smashing Security #153: Cybercrime doesn’t pay (but Uber does)

Source: National Cyber Security – Produced By Gregory Evans The cybercrime lovebirds who hijacked Washington DC’s CCTV cameras in the run-up to Donald Trump’s inauguration, the truffle-snuffling bankers at the centre of an insider-trading scandal, and the hackers that Uber paid hush money to hide a security breach. All this and much more is discussed […]

Corporate Cyber Espionage’s Channel …

Source: National Cyber Security – Produced By Gregory Evans Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage. The number of corporate espionage attacks is increasing. From advanced persistent threat attacks siphoning off proprietary research and intellectual property to fake social media […]

Siemens PLC Feature Can Be Exploited for Evil

Source: National Cyber Security – Produced By Gregory Evans A hidden feature in some newer models of the vendor’s programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it. An undocumented access feature in some newer models of Siemens programmable logic controllers (PLCs) can be used as both a […]

#cybersecurity | #hackerspace | Why PAM Should Be a CISO’s Top Priority

Source: National Cyber Security – Produced By Gregory Evans Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an appropriate level of privileged access controls, PAM helps organizations condense their organization’s attack surface […]

#nationalcybersecuritymonth | Do You Know How To Protect Yourself Against Phishing Emails? – University Times

Source: National Cyber Security – Produced By Gregory Evans Close Illustration by Lauren Dahncke Illustration by Lauren Dahncke Illustration by Lauren Dahncke National Cybersecurity Awareness month recently came to an end, but phishing emails never seem to.  According to Cal State LA’s Information Technology Security, phishing emails are sent to the recipient with the purpose […]

Disclosure Does Little to Dissuade Cyber Spies

Source: National Cyber Security – Produced By Gregory Evans In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations. When cybersecurity services firm Mandiant released its APT 1 report in 2013, the Chinese group immediately shut […]

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

Source: National Cyber Security – Produced By Gregory Evans A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words. Dubbed ‘Light Commands,’ the hack relies on a vulnerability in […]

#school | #ransomware | Las Cruces Public Schools computers still offline a week after hacking attack

Source: National Cyber Security – Produced By Gregory Evans Education LAS CRUCES, New Mexico — The computer network for the Las Cruces Public Schools remained offline a week after a ransomware attack by hackers forced the shutdown of the entire system. After originally trying to get existing servers for dozens of schools back online late […]