"Microsoft, FireEye, and the U.S. Treasury department have been hacked in the SolarWinds attacks."
* * *
It's true because by most people's understanding, these organizations have been hacked. But it doesn't tell the whole story accurately because each of these organizations has had different impacts with different levels of severity from "the hack."
The same is true now about being hacked. Some hacking is catastrophic, but some is survivable. We see this reality in the different reports coming out about "SolarWinds hacks." Some organizations are severely affected while others less so. But these crucial nuances are lost when we say they've all been "hacked."
Check out this next:
Hackers Amp Up COVID-19 IP Theft Attacks | Threatpost
In-depth report looks at how COVID-19 research has become as a juicy new target for organized cybercrime.
Attackers are looking to the healthcare space as a rich repository of intellectual property (IP) now more than ever, as critical research of COVID-19 therapeutics are developed and Pfizer, Moderna and other biotech firms begin to mass produce vaccines. Several incidents show that nation-states are targeting these companies with a vengeance, as the quest to beat the pandemic continues.
Suspected Russian hackers made failed attempt to breach CrowdStrike
The suspected Russian hackers blamed for breaking into a series of U.S. government agencies and cybersecurity company FireEye also made a failed attempt to hack into cybersecurity firm CrowdStrike , the Sunnyvale, California-based company said in a blog post.
* * *
Microsoft did not immediately return a message seeking comment on Thursday. The National Security Agency and the Cybersecurity and Infrastructure Security Agency did not immediately return messages.
Scope of Russian Hacking Becomes Clear: Multiple U.S. Agencies Were Hit - The New York Times
WASHINGTON — The scope of a hacking engineered by one of Russia's premier intelligence agencies became clearer on Monday, when some Trump administration officials acknowledged that other federal agencies — the State Department, the Department of Homeland Security and parts of the Pentagon — had been compromised. Investigators were struggling to determine the extent to which the military, intelligence community and nuclear laboratories were affected by the highly sophisticated attack .
Quite a lot has been going on:
The Level 10 Legend says: Are your employees leaving a back door wide open for hackers?
Most of your employees have wireless networks set up in their homes. But unlike with your business Wi-Fi, many home users are lax about creating secure wireless networks – leaving a back door open to hackers.
Wi-Fi signals often broadcast far beyond your employees' homes and out into the streets. Drive-by hacking is popular among cybercriminals today.
* * *
These security measures are not difficult to set up. If you have any questions or need assistance, we will be happy to help get your employees set up remotely.
Hackers threaten to leak plastic surgery pictures - BBC News
.css-14iz86j-BoldText{font-weight:bold;} Hackers have stolen the data of a large cosmetic surgery chain and are threatening to publish patients' before and after photos, among other details.
* * *
It has 11 clinics specialising in bariatric weight loss surgery, breast enlargements, nipple corrections and nose adjustments.
The company has previously promoted itself via celebrity endorsements, although it has not done so for several years.
"Dozens" of top Treasury email accounts hacked, senator says - CBS News
"Hackers broke into systems in the Departmental Offices division of Treasury, home to the department's highest-ranking officials. Treasury still does not know all of the actions taken by hackers, or precisely what information was stolen," Wyden said.
The Internal Revenue Service said there was no evidence the agency was compromised or taxpayer data affected, Wyden added.
* * *
Cybersecurity experts believe a sophisticated group of hackers was able to enter U.S. government networks earlier this year via a loophole in products developed by SolarWinds, which provides software for government agencies and large companies.
P2P coverage market provider Cover Protocol hacked but hacker returns stolen funds - SiliconANGLE
Peer-to-peer coverage market provider Cover Protocol has been hacked, but in a twist on a traditional hacking story, the hacker has not only come forward but has also refunded the funds stolen.
Cover Protocol offers a service in which users can buy cover on anything related to cryptocurrency. Working on a P2P basis, users buy coverage that is staked against other users who essentially bet that the coverage will not need to be paid out.
The hack of Cover Protocol occurred today and involved the hacker exploiting a vulnerability in Cover Protocol’s liquidity mining and farming contract called BlackSmith. The hacker exploited the bug to mint at least $2 million in funds.
Happening on Twitter
"To imply that I'm a #hacker and that that information is hacked has had an irreversible impact on my business & my… https://t.co/Di9x3IxH82 EpochTimes (from New York, USA) Tue Dec 29 05:24:02 +0000 2020
After the 1st official twitter acc got hacked and the concerned failed to recover post complaints,,,here is the new… https://t.co/6nW2IAtpxZ KicchaSudeep (from Bengaluru) Tue Dec 29 09:10:17 +0000 2020
I think its kinda funny how the top US cybersecurity chief said this was the most secure election in history, then… https://t.co/Ry1S1Ow3qE Lukewearechange (from Brooklyn NY) Mon Dec 28 21:56:33 +0000 2020
Treasury itself was hacked this month. An ongoing compromise where we still don't know the scope. A hack that follo… https://t.co/W29I1xDn2w balajis (from The Internet) Tue Dec 29 06:16:17 +0000 2020
No comments:
Post a Comment