Friday, April 24, 2020

Facebook: Here’s Proof Israeli WhatsApp Hackers Ran Cyberweapons In America

NSO Group's American attack infrastructure has been revealed by Facebook lawyers, according to the ... [+] counsel's recent filing. (Photo credit: JACK GUEZ/AFP via Getty Images)

Facebook lawyers have come out fighting in its lawsuit against Israeli spyware provider NSO Group by revealing details on how the latter's iPhone hacking tools were being operated in America. It's the first time the NSO attack infrastructure has been revealed and comes in spite of NSO's repeated claims its tools don't work in the U.S. And it raises more questions about how many Americans have been snooped on by NSO's spy tools.

Publisher: Forbes
Date: 2020-04-24
Author: Thomas Brewster
Twitter: @forbes
Reference: (Read more) Visit Source



In case you are keeping track:

FireEye: Vietnam hackers targeted China over Covid-19 — Quartz

Vietnam closed its borders to China and barred all flights from there on Feb. 1, just weeks after it became apparent that the novel coronavirus was spreading rapidly from Wuhan to the rest of the country. And as it was shutting itself off from its neighbor, hackers backed by the Vietnamese government were trying to hack into the heart of Chinese state organizations, according to research by US cybersecurity firm FireEye.

The attacks come as tensions have increased between the long-time foes, particularly in the South China Sea, where a Chinese ship collided with and sank a Vietnamese fishing boat earlier this month near the disputed Paracel Islands. Meanwhile, Vietnam has also challenged China's "mask diplomacy" by donating masks and other protective equipment of its own to other countries.

Publisher: Quartz
Author: Mary Hui
Twitter: @qz
Reference: (Read more) Visit Source



Google Sees State-Sponsored Hackers Ramping Up Coronavirus Attacks | WIRED

"There's arguably never been a better time to be a government hacker," says Peter Singer, a cybersecurity-focused strategist at the New America Foundation. "This is beyond the wildest dreams of the attacker in terms of the scale of remote work, in terms of all the ad hoc systems that have had to be put into place. The target might be a government or corporate system, or it's a personal account—it's just such an incredibly open environment."

TAG says that Google hasn't seen an increase in phishing attacks overall as a result of the pandemic. There was actually a slight decrease in total volume for March, compared with January and February. Such fluctuations are normal. They could even indicate that attackers are facing the same logistical challenges and productivity issues as most organizations dealing with the impacts of Covid-19.

Publisher: Wired
Author: Lily Hay Newman
Twitter: @wired
Reference: (Read more) Visit Source



Microsoft Azure security flaw exploit could let hackers create a 'skeleton key' | TechRadar

Microsoft Azure could be vulnerable to attack from compromised computing systems, even on-premise, new research has claimed.

A report from cybersecurity firm Varonis has discovered that an attacker can use a compromised on-premises IT environment to pivot and attack an organization's Azure environment.

Using a compromised PC as a stepping stone to move across a network to hack other targets is a tactic that cybercriminals frequently employ and security researcher at Varonis, Eric Saraga found that it was possible to manipulate an on-premises server known as an Azure agent to establish a backdoor and obtain user credentials from the cloud.

Publisher: TechRadar
Date: 2020-04-24T09:09:05 00:00
Author: https www facebook com TechRadar
Twitter: @TechRadar
Reference: (Read more) Visit Source



While you're here, how about this:

Bloomberg - Are you a robot?
Reference: (Read more) Visit Source



Wuhan lab coronavirus conspiracy theories targeted by hackers - Business Insider

"The number of cyberattacks is now more than five times the number directed at the organisation in the same period last year," the WHO said.

It was not clear who carried out the cyberattacks, but SITE suggested they were aimed at harassing the staff at the organisations and retrieving sensitive Covid-19 information, as they had all been part of conspiracy theories around the pandemic.

"The only thing that matters to [the far-right community] is that the data is available to use towards their own purposes — in this case being the spread of conspiracy theories about the 'lab-made' origins of the coronavirus, among other ideas," said Rita Katz, executive director of SITE.

logo
Publisher: Business Insider
Date: 2020-04-24
Author: Liu Zhen
Twitter: @bi_contributors
Reference: (Read more) Visit Source



Are hackers changing up their techniques as cybersecurity advances? - Security Boulevard

Hackers often don’t need to hack, they go right through the front door by exploiting the basics of access. As cybersecurity evolves, so do hackers.

* * *

For businesses, "lateral movement" is an emerging threat to protect against. It involves hackers pinpointing vulnerable servers and endpoints, and then moving "laterally" into other endpoints and servers in an organization that may house data that is more sensitive. To prevent lateral movement, enabling an enterprise-wide identity and access management services is key, making sure that access is limited, and anomalies can be easily detected.

Publisher: Security Boulevard
Date: 2020-04-23T19:08:12 00:00
Twitter: @securityblvd
Reference: (Read more) Visit Source



Nintendo confirms up to 160,000 people's accounts were hacked - CNET

Around 160,000 Nintendo players' personal information was accessed by a third party, the company said.

Nintendo users took to social media to complain that hackers were accessing their Nintendo accounts and then abusing attached payment card info to buy Fortnite currency and other Nintendo games.

"We sincerely apologize for any inconvenience caused and concern to our customers and related parties," Nintendo said on its Japanese site. "In the future, we will make further efforts to strengthen security and ensure safety so that similar events do not occur."

logo
Publisher: CNET
Author: Sean Keane
Twitter: @CNET
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment