Author Archives: CIRT Team



CIRT Team

in News Clipping

Why Businesses Should Care About Ransomware [source: cloudwards]

In the past couple of years, there has been a proliferation of ransomware attacks affecting individuals and organizations, ranging from government institutions to corporations, and small businesses. It’s a fairly popular attack tactic among hackers, mostly because of its sheer capability to easily extort from victims. But, what exactly are we talking about here? What is Ransomware? Imagine walking into your office one morning to find all...

Read More

0
25 Feb 2018
in News Clipping

IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign [securityintelligence]

IBM X-Force Incident Response and Intelligence Services (IRIS) assesses that threat groups of likely Nigerian origin are engaged in a widespread credential harvesting, phishing and social engineering campaign designed to steal financial assets. Beginning in the fall of 2017, X-Force IRIS experienced a significant increase in clients reporting instances of fraud or attempted fraud via wire transfer payments. These threat groups successfully used business email...

Read More

0
25 Feb 2018
in News Clipping

Amazon AWS Servers Might Soon Be Held for Ransom [source: bleepingcomputer]

Amazon AWS S3 cloud storage servers might soon fall victims to ransom attacks, similar to how hacker groups held tens of thousands of MongoDB databases for ransom throughout 2017. The statement, made today on social media by infosec expert Kevin Beaumont, is nothing short of a prophecy of things to come, an opinion shared by many security professionals to whom Bleeping Computer spoke today. Amazon AWS S3...

Read More

0
25 Feb 2018
in News Clipping

Tesla Internal Servers Infected with Cryptocurrency Miner [bleepingcomputer]

Hackers have breached Tesla cloud servers used by the company’s engineers and have installed malware that mines the cryptocurrency. The incident took place last year when hackers gained access to Tesla’s Kubernetes server, an open-source application used by large companies to manage API and server infrastructure deployed on cloud hosting providers. Hackers breached one of Tesla’s Kubernetes consoles Cloud security firm RedLock —whose experts discovered the hacked...

Read More

0
25 Feb 2018
Apple Releases Important iOS 11.2.6 Update for Special Character Bug [source: forbes]
in News

Apple Releases Important iOS 11.2.6 Update for Special Character Bug [source: forbes]

Today Apple released iOS 11.2.6 for the iPhone, iPad and iPod touch. iOS 11.2.6 did not go through any beta tests before it was released to the public. iOS 11.3 is currently being tested by developers. What Is Included In The iOS 11.2.6 Update? Screenshot Credit: Amit Chowdhry iOS 11.2.6 Update iOS 11.2.6 is considered a minor point software update so Apple did not add any new...

Read More

0
20 Feb 2018
in News Clipping

New iOS bug can crash iPhones and disable access to iMessages [source: theverge]

Apple had a shockingly bad week of software problems just before the end of 2017, and it looks like 2018 isn’t starting so well either. A new bug has been discovered in iOS 11 that lets people send a specific character that will crash an iPhone and block access to the Messages app in iOS and popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail....

Read More

0
18 Feb 2018
in News Clipping

Ransomware – Reminder for Healthcare Providers to Lock Down Their Environments [tripwire]

Ransomware attacks against healthcare providers aren’t new. In 2017, two crypto-malware infections affecting medical organizations made The State of Security’s top list of ransomware attacks for the year. The first involved an unknown strain that targeted Arkansas Oral & Facial Surgery Center, an incident which affected X-ray images, documents, and patient data related to recent appointments. The second was the now-infamous outbreak of WannaCry, ransomware which affected 34% of National...

Read More

0
15 Feb 2018
in News Clipping

IT Pros: IoT Devices Most Vulnerable to Wi-Fi Attacks [source: infosecurity-magazine]

IoT devices are the most vulnerable to Wi-Fi attacks, according to IT professionals polled in a new Spiceworks survey. The firm quizzed 527 IT pros from North America and Europe to examine how businesses are securing their data and devices on Wi-Fi networks. The research found that 52% of respondents believe workplace IoT devices such as smart lights and thermostats are ‘extremely vulnerable’ to Wi-Fi-based attacks, with...

Read More

0
15 Feb 2018
in News Clipping

Microsoft, Adobe February 2018 security updates: An overview [source: helpnetsecurity]

The Microsoft February 2018 security updates are for Internet Explorer, Edge, Windows, Office, Office Services and Web Apps, Adobe Flash, and ChakraCore (the core part of the Chakra Javascript engine that powers Microsoft Edge). Jimmy Graham, director of product management at Qualys, considers the Adobe Flash update and that for StructuredQuery in Windows servers and workstations to be the most critical and best implemented as soon as...

Read More

0
15 Feb 2018
in News Clipping

Olympic Destroyer Data-Wiping Malware Is More Complex Than Previously Thought[bleepingcomputer]

The Olympic Destroyer malware that has caused damage to PyeongChang 2018 Winter Olympics computer networks is much more complex than previously thought. Discovered by Cisco Talos researchers, this malware has been deployed before the start of the Olympics and has caused downtime to internal WiFi and television systems, disrupting some operations during the games’ opening ceremony. Cisco published an initial analysis (now updated) of this threat yesterday, revealing...

Read More

0
15 Feb 2018
Page 77 of 134« First...102030...7576777879...90100110...Last »