NSO Group's American attack infrastructure has been revealed by Facebook lawyers, according to the ... [+] counsel's recent filing. (Photo credit: JACK GUEZ/AFP via Getty Images)
Facebook lawyers have come out fighting in its lawsuit against Israeli spyware provider NSO Group by revealing details on how the latter's iPhone hacking tools were being operated in America. It's the first time the NSO attack infrastructure has been revealed and comes in spite of NSO's repeated claims its tools don't work in the U.S. And it raises more questions about how many Americans have been snooped on by NSO's spy tools.
In case you are keeping track:
FireEye: Vietnam hackers targeted China over Covid-19 — Quartz
Vietnam closed its borders to China and barred all flights from there on Feb. 1, just weeks after it became apparent that the novel coronavirus was spreading rapidly from Wuhan to the rest of the country. And as it was shutting itself off from its neighbor, hackers backed by the Vietnamese government were trying to hack into the heart of Chinese state organizations, according to research by US cybersecurity firm FireEye.
The attacks come as tensions have increased between the long-time foes, particularly in the South China Sea, where a Chinese ship collided with and sank a Vietnamese fishing boat earlier this month near the disputed Paracel Islands. Meanwhile, Vietnam has also challenged China's "mask diplomacy" by donating masks and other protective equipment of its own to other countries.
Google Sees State-Sponsored Hackers Ramping Up Coronavirus Attacks | WIRED
"There's arguably never been a better time to be a government hacker," says Peter Singer, a cybersecurity-focused strategist at the New America Foundation. "This is beyond the wildest dreams of the attacker in terms of the scale of remote work, in terms of all the ad hoc systems that have had to be put into place. The target might be a government or corporate system, or it's a personal account—it's just such an incredibly open environment."
TAG says that Google hasn't seen an increase in phishing attacks overall as a result of the pandemic. There was actually a slight decrease in total volume for March, compared with January and February. Such fluctuations are normal. They could even indicate that attackers are facing the same logistical challenges and productivity issues as most organizations dealing with the impacts of Covid-19.
Microsoft Azure security flaw exploit could let hackers create a 'skeleton key' | TechRadar
Microsoft Azure could be vulnerable to attack from compromised computing systems, even on-premise, new research has claimed.
A report from cybersecurity firm Varonis has discovered that an attacker can use a compromised on-premises IT environment to pivot and attack an organization's Azure environment.
Using a compromised PC as a stepping stone to move across a network to hack other targets is a tactic that cybercriminals frequently employ and security researcher at Varonis, Eric Saraga found that it was possible to manipulate an on-premises server known as an Azure agent to establish a backdoor and obtain user credentials from the cloud.
While you're here, how about this:
Bloomberg - Are you a robot?
Wuhan lab coronavirus conspiracy theories targeted by hackers - Business Insider
"The number of cyberattacks is now more than five times the number directed at the organisation in the same period last year," the WHO said.
It was not clear who carried out the cyberattacks, but SITE suggested they were aimed at harassing the staff at the organisations and retrieving sensitive Covid-19 information, as they had all been part of conspiracy theories around the pandemic.
"The only thing that matters to [the far-right community] is that the data is available to use towards their own purposes — in this case being the spread of conspiracy theories about the 'lab-made' origins of the coronavirus, among other ideas," said Rita Katz, executive director of SITE.
Are hackers changing up their techniques as cybersecurity advances? - Security Boulevard
Hackers often don’t need to hack, they go right through the front door by exploiting the basics of access. As cybersecurity evolves, so do hackers.
* * *
For businesses, "lateral movement" is an emerging threat to protect against. It involves hackers pinpointing vulnerable servers and endpoints, and then moving "laterally" into other endpoints and servers in an organization that may house data that is more sensitive. To prevent lateral movement, enabling an enterprise-wide identity and access management services is key, making sure that access is limited, and anomalies can be easily detected.
Nintendo confirms up to 160,000 people's accounts were hacked - CNET
Around 160,000 Nintendo players' personal information was accessed by a third party, the company said.
Nintendo users took to social media to complain that hackers were accessing their Nintendo accounts and then abusing attached payment card info to buy Fortnite currency and other Nintendo games.
"We sincerely apologize for any inconvenience caused and concern to our customers and related parties," Nintendo said on its Japanese site. "In the future, we will make further efforts to strengthen security and ensure safety so that similar events do not occur."
Happening on Twitter
Facebook keeps protecting Democrats by censoring POTUS supporters. Our "Nancy Antoinette" Ice Cream video was labe… https://t.co/S2Q4xx0mTr parscale (from Washington, DC) Thu Apr 23 19:20:46 +0000 2020
zoom has exploded in growth in just two months. now the competition is coming for it. here is a story on what's ha… https://t.co/0DXPBCjiF6 MikeIsaac (from San Francisco) Fri Apr 24 18:15:26 +0000 2020
Here's a quick thread, an interesting journey about the ingesting disinfectant idea and pro-Trump media spaces. It… https://t.co/jJLRhcXId1 oneunderscore__ (from New York, NY) Fri Apr 24 14:24:59 +0000 2020
No comments:
Post a Comment