The average total cost of a data breach declined, but costs increased for many organizations

Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data breaches experienced by over 500 organizations worldwide, 80% of these incidents r… Continue reading The average total cost of a data breach declined, but costs increased for many organizations

European police bust Polish gang suspected of hacking and stealing cars

German and Polish police agencies announced Wednesday they had dismantled a Polish criminal network accused of stealing dozens of cars by breaching the keyless systems used to start the vehicles. The alleged thieves had racked up at least 34 vehicles worth $1.6 million by the time investigators raided their properties in Poland last week, according to Europol, the European Union’s law enforcement agency. The alleged Polish criminal network appears to be reeling. Seven of its suspected members were arrested last year, and two more in recent months, Europol said. It is unclear exactly how the hacking went down; Europol would only say that the suspects used “technical equipment” to crack the “Keyless Go” systems that allow a driver to unlock and start a car electronically. A Europol spokesperson did not immediately respond to a request for comment. “This is a known issue that has kept car companies up at night […]

The post European police bust Polish gang suspected of hacking and stealing cars appeared first on CyberScoop.

Continue reading European police bust Polish gang suspected of hacking and stealing cars

Iran-linked hackers steal sensitive data from U.S. Navy member, researchers say

Allison Wikoff has spent years tracking suspected Iranian hackers, sifting through data they’ve left behind and analyzing their techniques. But in May, when her colleague stumbled upon a server with 40 gigabytes of the hackers’ training videos and online personas, Wikoff knew she had struck gold. “[When] we started combing through all the data and video files we couldn’t believe what we were seeing,” said  Wikoff, a cyber threat analyst on IBM’s X-Force security team. “This discovery brought a whole new meaning to observing ‘hands-on keyboard activity.’” The nearly five hours of videos found on the server, which IBM reported publicly on Thursday, include evidence of a suspected Iranian hacker stealing data from the personal email and social media accounts of an enlisted member of the U.S. Navy and a Greek naval officer. The attacker managed to exfiltrate files on the military unit of the U.S. Navy member and their […]

The post Iran-linked hackers steal sensitive data from U.S. Navy member, researchers say appeared first on CyberScoop.

Continue reading Iran-linked hackers steal sensitive data from U.S. Navy member, researchers say

In Brazil, scammers see the coronavirus as a serious money-making opportunity

Brazilian President Jair Bolsonaro’s critics say he hasn’t taken the impact of the coronavirus seriously. The same can’t be said for Brazil’s cybercriminals. As deaths from the virus have surged past 66,000 in Brazil, scammers have set up new infrastructure to dupe people who are desperate for relief, and have set up bank accounts in their names. At a time when even more people in South America’s biggest country are glued to their phones or computers, Brazil’s already-flourishing cybercriminal economy has been busy. “Scam operations have been highly effective in Brazil, from the first announcement of the government assistance program,” Jefferson Macedo, managing consultant on IBM’s X-Force security team, told CyberScoop. IBM has uncovered nearly 700 malicious websites related to COVID-19, the disease caused by the virus, in recent months. The crooks are impersonating government apps used to sign up for financial relief and sending people a flurry of text […]

The post In Brazil, scammers see the coronavirus as a serious money-making opportunity appeared first on CyberScoop.

Continue reading In Brazil, scammers see the coronavirus as a serious money-making opportunity

Ransomware gangs are doing their homework before encrypting corporate data

The lengthy amount of time that criminal hackers are sitting undetected on the networks of U.S. businesses is giving them powerful leverage to extort their victims, according to a Department of Homeland Security cybersecurity official. Going unnoticed on corporate networks allows ransomware gangs to size up their victims and funnel out data before ransom negotiations even begin, said Matt Travis, deputy director of DHS’s Cybersecurity and Infrastructure Security Agency. “They’re not just going into networks and seizing data,” Travis said Wednesday at IBM’s Think Gov Digital event, produced by FedScoop. “They’re snooping around” for balance sheets and other financial data to “gain intelligence on how much of a ransom they think they can get.” In the last three months, the criminal hackers behind the Maze ransomware have attacked two big IT service providers, one of which is a Fortune 500 company. Other ransomware gangs have hit big corporate targets, and […]

The post Ransomware gangs are doing their homework before encrypting corporate data appeared first on CyberScoop.

Continue reading Ransomware gangs are doing their homework before encrypting corporate data

Employees are worried about cyber threats in their home office environments

IBM Security released findings from a study focused on the behaviors and security risks of those new to working from home (WFH) during the COVID-19 pandemic. Cyber threats in the home office The study shows more than 80% of respondents either rarely wo… Continue reading Employees are worried about cyber threats in their home office environments

Top security risks for companies to address as cloud migration accelerates

The ease and speed at which new cloud tools can be deployed is also making it harder for security teams to control their usage, IBM Security reveals. According to the data, basic security oversight issues, including governance, vulnerabilities, and mis… Continue reading Top security risks for companies to address as cloud migration accelerates

Hackers target senior executives at German company procuring PPE

On March 30, as the novel coronavirus swept through Germany, the country’s government tasked nine multinational companies, including pharmaceutical giant Bayer and automaker Volkswagen, with procuring personal protective equipment to make up for a lack of gear. The same day, unidentified hackers began an intensive phishing campaign to infiltrate at least one of those nine firms, according to research published Monday by IBM. The findings show how multiple aspects of societies’ response to the coronavirus — from testing facilities to vaccine research to PPE procurement — have been targeted by hackers of various stripes. The phishing attempts against the unnamed German company, which are ongoing, have extended to more than 100 senior management and procurement executives at the company and its suppliers in multiple sectors, according to IBM. It is unclear if the hacking has been successful, or who is responsible (IBM researchers weren’t sure). What is clear is that […]

The post Hackers target senior executives at German company procuring PPE appeared first on CyberScoop.

Continue reading Hackers target senior executives at German company procuring PPE

How Zero Trust Will Change Your Security Design Approach

How would Zero Trust change the way security solutions are designed and where does one even start when implementing Zero Trust principles into their architecture? Learn more here.

The post How Zero Trust Will Change Your Security Design Approach appeared first on Security Intelligence.

Continue reading How Zero Trust Will Change Your Security Design Approach