Resources

July 17, 2019
Apple's stealth Mac security update removes flawed software, report says

Apple quietly rolled out a Mac security update to remove flawed software from Zoom partner apps RingCentral and Zhumu, according to a BuzzFeed News report. The update will reportedly roll out automatically but could take some time to reach all affected computers. RingCentral and Zhumu are videoco...

July 17, 2019
Ukrainian hacker arrested after allegedly providing bulletproof hosting to Russian security

Ukrainian police have arrested an accused cybercriminal who allegedly facilitated a web hosting scheme that made it possible for hackers to carry out attacks while avoiding international law enforcement. Mikhail Rytikov, a Ukrainian national, was apprehended in Odessa as part of an operation c...

July 17, 2019
A Feisty Google Adversary Tests How Much People Care About Privacy

PAOLI, Pa. -- Gabriel Weinberg is taking aim at Google from a small building 20 miles west of Philadelphia that looks like a fake castle. An optometrist has an office downstairs. Mr. Weinberg’s company, DuckDuckGo, has become one of the feistiest adversaries of Google. Started over a decade ...

July 17, 2019
Sprint says hackers breached customer accounts via Samsung website

US mobile network operator Sprint said hackers broke into an unknown number of customer accounts via the Samsung.com "add a line" website. "On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.com 'add.....

July 17, 2019
Exclusive: Security reports reveal how Assange turned an embassy into a command post for election meddling

Atlanta (CNN) -- New documents obtained exclusively by CNN reveal that WikiLeaks founder Julian Assange received in-person deliveries, potentially of hacked materials related to the 2016 US election, during a series of suspicious meetings at the Ecuadorian Embassy in London. The documents......

July 5, 2019
YouTube's 'instructional hacking' ban threatens computer security teachers

By Adi Robertson The Verge July 3, 2019 Earlier this year, YouTube added hacking and phishing tutorials to its examples of banned video content — and that ban has been publicized thanks to an apparent crackdown on an ethical “white hat” hacking and computer security channel. Kody Kinzie...

July 5, 2019
7-Eleven Japanese customers lose $500, 000 due to mobile app flaw

By Catalin Cimpanu Zero Day ZDNet News July 4, 2019 Approximately 900 customers of 7-Eleven Japan have lost a collective of ¥55 million ($510,000) after hackers hijacked their 7pay app accounts and made illegal charges in their names. The incident was caused by an appalling security lapse in ...

July 5, 2019
DerpTrolling hacker sentenced to 27 months behind bars

By Duncan Riley SiliconANGLE July 4, 2019 A 23-year-old man who was involved in multiple distributed denial-of-service attacks in December 2013 and January 2014 that targeted online gaming services has been sentenced to 27 months in prison. Austin Thompson, known online as DerpTroll, was part ...

July 5, 2019
Someone Is Spamming and Breaking a Core Component of PGP's Ecosystem

By Lorenzo Franceschi-Bicchierai Vice.com July 3, 2019 Unknown attackers are spamming a core component of the ecosystem of the well-known encryption software PGP, breaking users' PGP installations and clients. What’s worse, there may be no way to stop them. Last week, contributors to th...

July 5, 2019
Hackers have crippled computer systems in some U.S. cities, so Springfield ran a test to help its workers spot 'phishing' emails; how'd it go?

By Matt Berg The Republican July 4, 2019 In the midst of cyber attacks on cities and towns across the United States that have crippled municipal networks - and, in some cases, led communities to pay six-figure ransoms to hackers - Springfield ran an exercise in June to help......

July 3, 2019
Symantec shares soar on report that Broadcom is in talks to acquire the security software maker

By Ari Levy CNBC.com July 2, 2019 Symantec shares surged more than 20% in extended trading on Tuesday after Bloomberg reported that Broadcom is in advanced talks to acquire the security software vendor. Symantec has been plagued in recent years by management turmoil and a flailing core busine...

July 3, 2019
Spies fear a consulting firm helped hobble U.S. intelligence

By Natasha Bertrand and Daniel Lippman Politico.com 07/02/2019 America's vast spying apparatus was built around a Cold War world of dead drops and double agents. Today, that world has fractured and migrated online, with hackers and rogue terrorist cells, leaving intelligence operatives sc...

July 3, 2019
Security flaws in a popular smart home hub let hackers unlock front doors

By Zack Whittaker TechCrunch July 2, 2019 When is a smart home not so smart? When it can be hacked. That’s exactly what security researchers Chase Dardaman and Jason Wheeler did with one of the Zipato smart hubs. In new research published Tuesday and shared with TechCrunch, Dardaman and Whee...

July 3, 2019
Hacker deletes all content from University of Ottawa newspaper's website

By Christopher Whan Global News July 2, 2019 Editors at the University of Ottawa's student newspaper, The Fulcrum, were treated to an unpleasant surprise late Saturday night when all of the content on their website had been deleted and replaced with a single post making fun of the hack. ...

July 3, 2019
Tulsi Gabbard Says a Teen Hacked a Replica of Florida's Election System. She's Wrong

By Lorenzo Franceschi-Bicchierai Vice.com July 1, 2019 The spectre of Russian hacking and election interference is very much a presence in the lead up to the 2020 presidential elections. And Hawaii Rep. and presidential candidate Tulsi Gabbard has been one of the more outspoken candidates when...

July 19, 2019
Malware in PyPI Code Shows Supply Chain Risks

A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories....

July 19, 2019
Europol Head Fears 5G Will Give Criminals an Edge

Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks....

July 19, 2019
Mirai Groups Target Business IoT Devices

More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business....

July 19, 2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike

Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions. ...

July 19, 2019
Crack the Defenses of iOS and other Platforms at Black Hat USA

Get the latest insights into how to attack and defend platforms like iOS, MacOS, and Windows 10 at this upcoming August security conference....

July 18, 2019
Security Lessons From a New Programming Language

A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process....

July 18, 2019
BitPaymer Ransomware Operators Wage Custom, Targeted Attacks

A new framework is allowing the threat group to compile variants of the malware for each victim, Morphisec says....

July 18, 2019
RDP Bug Takes New Approach to Host Compromise

Researchers show how simply connecting to a rogue machine can silently compromise the host....

July 18, 2019
Open Source Hacking Tool Grows Up

Koadic toolkit gets upgrades - and a little love from nation-state hackers....

July 18, 2019
8 Legit Tools and Utilities That Cybercriminals Commonly Misuse

Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity. ...

July 18, 2019
Bulgarian Tax Breach Nets All the Records

An attack by a 'wizard hacker' results in leaked records for virtually every Bulgarian taxpayer....

July 18, 2019
How Capture the Flag Competitions Strengthen the Cybersecurity Workforce

These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields....

July 18, 2019
79% of US Consumers Fear Webcams Are Watching

Widespread privacy concerns have caused 60% of people to cover their laptop webcams - some in creative ways - survey data shows....

July 18, 2019
Calculating the Value of Security

What will it take to align staff and budget to protect the organization?...

July 17, 2019
MITRE ATT&CK Framework Not Just for the Big Guys

At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language....

July 17, 2019
Bluetooth Bug Enables Tracking on Windows 10, iOS & macOS Devices

Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access....

July 17, 2019
800K Systems Still Vulnerable to BlueKeep

Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says....

July 17, 2019
Sprint Reveals Account Breach via Samsung Website

The last-June breach exposed data including names, phone numbers, and account numbers....

July 17, 2019
A Password Management Report Card

New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings. ...

July 17, 2019
Data Loss, Leakage Top Cloud Security Concerns

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers....

Discover how Cloudburst Security can support you.

CONTACT US