Cybersecurity professionals are outgunned and burned out

https://www.helpnetsecurity.com/2019/06/28/cybersecurity-burnout/

Excerpt:

“Nearly half (48 percent total) of cybersecurity leaders across France, Germany and the UK believe their teams are falling behind in the skills race against would-be cyber criminals, according to Symantec.”


Anatomy of a ransomware attack: How attackers gain access to unstructured data

Kris Lahiri

https://www.helpnetsecurity.com/2019/06/27/anatomy-ransomware-attack/

Excerpt:

“Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank have all been hit in recent years, and the list is growing. The ongoing saga of the ransomware attack in Baltimore, MD has left citizens unable to pay parking tickets or finalize property sales.”


Ransomware Attack: 2nd Florida City Pay Hackers $460,000 to Unlock Data

Joe Panettieri

https://www.msspalert.com/cybersecurity-breaches-and-attacks/ransomware/lake-city-florida-pays-hackers/

Excerpt:

“Officials in Lake City, Florida, have voted to pay hackers $460,000 to recover data from a ransomware attack, BBC reports. This is the third time in recent days that a U.S. city or an MSP has paid hackers a major sum in an attempt to recover data from a ransomware attack.”


400GB of hacked files from US border surveillance contractor are available for anyone to download

Graham Cluley

https://www.grahamcluley.com/400gb-of-hacked-files-from-us-border-surveillance-contractor-are-available-for-anyone-to-download/

Excerpt:

“You don’t have to be hacked to lose control of your sensitive data.That truth was brought home again this month when it was revealed that information gathered by the United States Customs and Border Protection (CBP), the largest federal law enforcement agency at the Department of Homeland Security, had leaked onto the internet.”


Hackers are stealing years of call records from hacked cell networks

Zack Whittaker

https://techcrunch.com/2019/06/24/hackers-cell-networks-call-records-theft/

Excerpt:

“Security researchers say they have uncovered a massive espionage campaign involving the theft of call records from hacked cell network providers to conduct targeted surveillance on individuals of interest.


User data stolen from ‘human hacking’ forum Social Engineered, published on rival site

Charlie Osborne

https://www.zdnet.com/article/user-data-stolen-from-human-hacking-forum-social-engineered-published-on-rival-site/

Excerpt:

“A forum dedicated to the art of social engineering, Social Engineered, has been compromised and its users' data leaked on a rival website.”


U.S. Government Warns of Data Wipers Used in Iranian Cyberattacks

Lawrence Abrams

https://www.bleepingcomputer.com/news/security/us-government-warns-of-data-wipers-used-in-iranian-cyberattacks/

Excerpt:

“According to a statement by the U.S. Cybersecurity and Infrastructure Security Agency, an increase in cyberattacks utilizing destructive wiper tools has been detected targeting U.S. industries and government agencies by Iranian actors or proxies.”


41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

https://www.helpnetsecurity.com/2019/06/21/connected-iot-devices-forecast/

Excerpt:

“The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace.”


Insured losses from a cyber catastrophe could reach billions

https://www.helpnetsecurity.com/2019/06/21/insured-business-interruption-losses/

Excerpt:

“Analysis shows insured business interruption losses from a cyber catastrophe could reach an estimated $3.25 billion.”


High-risk vulnerabilities found in 1/3 of iOS apps, nearly half of Android apps

https://www.helpnetsecurity.com/2019/06/21/vulnerabilities-ios-android-apps/

Excerpt:

“Expert testing of iOS and Android mobile applications shows that in most cases, insecure data storage is the most common security flaw in mobile apps.”


IoT explodes worldwide, researchers investigate security issues present in the devices real users own

https://www.helpnetsecurity.com/2019/06/20/iot-cybersecurity-challenges/

Excerpt:

“About 40 percent of households across the globe now contain at least one IoT device, according to Avast.”


FBI warning: Foreign spies using social media to target government contractors

Catalin Cimpanu

https://www.zdnet.com/article/fbi-warning-foreign-spies-using-social-media-to-target-government-contractors/

Excerpt:

“The US Federal Bureau of Investigations has sent a warning to private sector partners about foreign intelligence services using social media accounts to target and recruit employees with US government clearance.”


Thousands of medical injury claim records exposed by ad agency

Zack Whittaker

https://techcrunch.com/2019/06/14/medical-injury-claim-data-exposed/

Excerpt:

“An internet advertising company specializing in helping law firms sign up potential clients has exposed close to 150,000 records from a database that was left unsecured.”


5G subscriptions to reach 1.9 billion in 2024, critical IoT connections on the rise

https://www.helpnetsecurity.com/2019/06/14/5g-subscriptions-forecast/

Excerpt:

“Rapid early momentum and enthusiasm for 5G has led Ericsson to forecast an extra 400 million enhanced mobile broadband subscriptions globally by the end of 2024.”


2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S.

https://www.helpnetsecurity.com/2019/06/05/2018-data-breaches-cost-usa/

Excerpt:

“Cybercriminals exposed 2.8 billion consumer data records in 2018, costing over $654 billion to U.S. organizations, according to ForgeRock.”


Hackproofing smart meters and boosting smart grid security

https://www.helpnetsecurity.com/2019/06/11/hackproofing-smart-meters/

Excerpt:

“Smart electricity meters are useful because they allow energy utilities to efficiently track energy use and allocate energy production. But because they’re connected to a grid, they can also serve as back doors for malicious hackers.”


Hackers steal 19 years’ worth of data from a top Australian university

Tomáš Foltýn

https://www.welivesecurity.com/2019/06/04/data-stolen-australia-university/

Excerpt:

“A premier Australian university has disclosed a cyberattack that compromised the personal information of its students and staff extending back nearly two decades.”


Hack The Sea: Bridging the gap between hackers and the maritime sector

Zeljka Zorz

https://www.helpnetsecurity.com/2019/06/04/hack-the-sea/

Excerpt:

“There’s a not a lot of researchers probing the security of computer systems underpinning the maritime industry.”


Nearly 12 million Quest Diagnostics patients affected by data breach

Zeljka Zorz

https://www.helpnetsecurity.com/2019/06/04/quest-diagnostics-data-breach/

Excerpt:

“Quest Diagnostics, a US-based company that offers medical testing services, has announced that a third-party billing collections company they use has been hit by a data breach, affecting 11.9 million of Quest’s customers.”


Hackers Abusing Microsoft Azure to Deploy Malware and C2 Servers Using Evasion Technique

Balaji N

https://gbhackers.com/microsoft-azure-to-deploy-malware/

Excerpt:

“Now Microsoft Azure becomes a sweet spot for hackers to host powerful malware and also as a command and control server for sending and receiving commands to compromised systems.”