Cyber Security Roundup for February 2019

The perceived threat posed by Huawei to the UK national infrastructure continued to make the headlines throughout February, as politicians, UK government agencies and the Chinese telecoms giant continued to play out their rather public spat in the medi… Continue reading Cyber Security Roundup for February 2019

Attackers continue to enhance their performance, apply smart business techniques

During the second half of 2018, attackers bulked up existing tactics, rapidly evolvied new performance enhancements, and applied smart business techniques to vastly accelerate attack growth rate, according to the latest Threat Landscape Report by Netsc… Continue reading Attackers continue to enhance their performance, apply smart business techniques

Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets

Attackers looking to add IoT devices to their botnets are increasingly adding vulnerability exploitation to their attack arsenal, Netscout researchers warn. Instead on just relying on a list of common or default passwords or brute-forcing attacks, they… Continue reading Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets

Suspected North Korean hackers target universities using Chrome extension

While North Korean hackers are known for stealing money to finance Kim Jong Un’s authoritarian regime, Pyongyang may also be engaging in a cyber-espionage campaign targeting universities, new research shows. The hacking operation, which began in May, if not earlier, uses malicious Google Chrome extensions to gain a foothold into a victim’s computer, according to ASERT, the threat intelligence group of Netscout’s Arbor Networks. Once the hackers compromised a target network, they used “off-the-shelf tools,” like remote desktop protocol, to retain access to the network, according to ASERT.  The goal of the operation, dubbed “Stolen Pencil,” appears to be maintaining persistent access; researchers found no evidence of data theft. “A large number of the victims, across multiple universities, had expertise in biomedical engineering, possibly suggesting a motivation for the attackers’ targeting,” states the research, which was published Wednesday. The malicious extensions have been removed from the Google Play Store, ASERT says. Although […]

The post Suspected North Korean hackers target universities using Chrome extension appeared first on Cyberscoop.

Continue reading Suspected North Korean hackers target universities using Chrome extension

Tech companies offered free products to help secure the election. Now what?

The unprecedented foreign hacking and misinformation campaigns that were reported around the 2016 U.S. election cast a cloak of doubt over the integrity of the country’s democratic process. The threat sent government officials on the federal, state and local level scrambling to ensure that the country’s voting machines, voter registration systems, pollbooks, results-reporting websites and other election technology is ready for the midterm elections. Over the past few months, about a dozen technology companies have announced programs offering state and local election offices or political organizations free services to help them fend off looming threats, including email protection, extra security for cloud applications, basic antivirus coverage, multi-factor authentication tools and several other types of products. As elections in the U.S. are run by the states, securing a federal election requires a massive coordinated effort. The federal government has been playing a greater role to this end since 2016, but can only do so much without […]

The post Tech companies offered free products to help secure the election. Now what? appeared first on Cyberscoop.

Continue reading Tech companies offered free products to help secure the election. Now what?

Security Solutions, Acquisitions, and IPOs – Enterprise Security Weekly #112

Netscout takes internet scale Threat Protection to the EDGE, Splunk addresses several vulnerabilities in Enterprise and Light products, Ping Identity launches a Quickstart Private Sandbox, and we have some acquisition updates from CheckPoint acquiring … Continue reading Security Solutions, Acquisitions, and IPOs – Enterprise Security Weekly #112

News – Enterprise Security Weekly #52

Fortinet preps for a next-gen firewall, Samsung no longer mails printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update, and more! Fortinet prepping for next-generation firewall – Its next, next generation firewall: “Today is not only about network security anymore,” Xie said. “It’s from the network, to […]

The post News – Enterprise Security Weekly #52 appeared first on Security Weekly.

Continue reading News – Enterprise Security Weekly #52