Cisco Warns of Critical Auth-Bypass Security Flaw
“A successful exploit could allow the attacker to receive a token with administrator-level privileges that could be used to authenticate to the API on affected MSO and managed Cisco Application Policy Infrastructure Controller (APIC) devices,” said Cisco on Wednesday. The vulnerability (CVE-2021-1388) ranks 10 (out of 10) on the CVSS vulnerability-rating scale.
Cyber Attack on Water Supply Is a Wake-up Call for State, Local Governments
Depending on the size of the municipality, local and county governments can often maintain more constituent data than the entire federal government – consider tax records, school enrollment information, licensing data, healthcare records, even criminal backgrounds. [...] Since local governments retain a wealth of personally identifiable information, they have a fiduciary duty – a cyber “Duty of Care” – to safeguard that critical constituent data.
Research: Cloud Ransomware Hit Nearly 40% of Healthcare Organizations in 2020
The top consequences of cloud breaches in the healthcare sector were:
- Unplanned expenses to fix security gaps (24%)
- Compliance fines (23%) and lawsuits (11%).
- Most healthcare organizations attribute their cloud security challenges to lack of budget (61%), lack of IT/security staff (56%) and employee negligence (39%).
Healthcare Cyberattacks Doubled in 2020, with 28% Tied to Ransomware
Scanning and exploiting vulnerabilities were the most successful entry points into victims’ networks across all sectors, with 35 percent of attacks. Mirroring earlier reports, it’s the first time vulnerability exploits surpassed phishing-based compromises (33 percent).
'A new dimension of fraud': 6 cybersecurity execs weigh in on vaccine data hacks, manipulations and leaks
What if the efficacy of a drug or vaccine is modified due to a run silent, run deep cybersecurity attack? The same scenario could apply to a specific patient. When we detect a "hack" at least we are in a position to respond; what happens when the hack goes undetected and data is modified?
This chart shows the connections between cybercrime groups
Cybercrime groups often have complex supply chains, like real software companies, and they regularly develop relationships within the rest of the e-crime ecosystem to acquire access to essential technology that enables their operations or maximizes their profits.
Npower app attack exposed customers' bank details
"We identified suspicious cyber-activity affecting the Npower mobile app, where someone has accessed customer accounts using login data stolen from another website. This is known as 'credential stuffing'," the firm said in a statement.
These four new hacking groups are targeting critical infrastructure, warns security company
Some of these new groups have very specific targets – for example, Stibnite focuses on wind turbine companies that generate electric power in Azerbaijan, while Talonite almost exclusively focuses on attempting to gain access to electricity providers in the US.
The Hack Roundup: State Department Cyber Office Clears Committee Amid Push for International Norms
The House Foreign Affairs Committee unanimously approved the creation of a new bureau of international cyberspace policy at the State Department as part of the Cyber Diplomacy Act, a move that could take on more importance in the wake of the massive hack that compromised at least nine federal agencies.
DHS’ Mayorkas Announces $25 Million Increase to FEMA Cybersecurity Grants and Future Cyber Plans
Mayorkas also announced he is looking to implement new grant programs through the Cybersecurity and Infrastructure Security Agency (CISA) to support state and local governments, because “the nation’s cybersecurity is only as strong as its weakest link.”
DOJ Indictment Highlights Methods Utilized by State Sponsored Cybercriminal Organization to Attack Major Industry and Government Entities
Importantly, the threat from Lazarus Group members, including the charged defendants, remains ongoing. While DOJ also announced that a Canadian-American citizen had pled guilty to a money laundering charge stemming from related conduct, the charged defendants all remain fugitives and the Lazarus Group’s involvement in state sponsored cyberattacks is expected to continue in the future.
The Latest North Korea Cyber Indictment Should Serve as a Model
Since they can address only past behavior, criminal indictments should be coupled with prospective action in order to mitigate ongoing or future actions by the indicted actors or their organizations. In this case, a federal advisory alert detailing the malware currently used by North Korean hackers to target cryptocurrency exchanges accompanied the DOJ indictment.
'A reckoning is near': America has a vast overseas military empire. Does it still need it?
"It was designed for a world that still faced another military hegemon," Parsi said. "Now, pandemics, climate chaos, artificial intelligence and 5G are far more important for American national security than having 15 bases in the Indian Ocean."
These states are on track to pass data privacy laws this year
2021 could be the year that privacy laws become more pervasive across the country, helping Americans wrest back some of the aspects of their digital lives. Here’s a rundown of other state-level privacy laws beyond those in Illinois and California, plus the bills that could be passed into law this year.
Code-execution flaw in VMware has a severity rating of 9.8 out of 10
Within a day of VMware issuing a patch, proof-of-concept exploits appeared from at least six different sources. The severity of the vulnerability, combined with the availability of working exploits for both Windows and Linux machines, sent hackers scrambling to actively find vulnerable servers.
Cryptocurrency exchange in liquidation due to hack, hacked again
The ironic part is that Cryptopia is currently in liquidation, and it has been hacked twice. The company was placed on liquidation in May 2020. According to a New Zealand High Court judge, Justice David Gendall’s ruling on April 8, the account holders own Cryptopia’s remaining crypto-assets instead of the exchange.
Malicious Mozilla Firefox Extension Allows Gmail Takeover
Researchers say the threat campaign, observed in January and February, targeted Tibetan organizations and was tied to TA413, a known advanced persistent threat (APT) group that researchers believe to be aligned with the Chinese state. The group behind this attack aims to gather information on victims by snooping in on their Firefox browser data and Gmail messages, said researchers.
How $100M in Jobless Claims Went to Inmates
A new report (PDF) from the Labor Department’s Office of Inspector General (OIG) found that from March through October of 2020, some $3.5 billion in fraudulent jobless benefits — nearly two-thirds of the phony claims it reviewed — was paid out to individuals with Social Security numbers filed in multiple states. Almost $100 million went to more than 13,000 ineligible people who are currently in prison.