Friday, February 5, 2021

Subscribe to read | Financial Times

logo
Twitter: @FinancialTimes
Reference: (Read more) Visit Source



This may worth something:

NIST Publishes State-Sponsored Hacker Data Protection Tools

The National Institutes of Science and Technology (NIST) continues to offer timely and relevant information for companies to consider when addressing cyber-risks in an ever-changing landscape.

On February 2, 2021, NIST published an alert outlining tools it has developed to assist companies "to help defend against state-sponsored hackers.

Following the Chinese government's 2018 hack of a third-party contractor of the United States Navy in which, according to the Washington Post, the Chinese government "stole a large amount of highly sensitive data on undersea warfare," NIST developed and published its draft Special Publication SP 800-172 to assist in protecting CUI against APT.

Publisher: The National Law Review
Date: 5493B547C0AB527FF4CF8C4D0127302A
Reference: (Read more) Visit Source



Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on U.S.

WASHINGTON (Reuters) - Suspected Chinese hackers exploited a flaw in software made by SolarWinds Corp to help break into U.S. government computers last year, five people familiar with the matter told Reuters, marking a new twist in a sprawling cybersecurity breach that U.S. lawmakers have labeled a national security emergency.

Two people briefed on the case said FBI investigators recently found that the National Finance Center, a federal payroll agency inside the U.S. Department of Agriculture, was among the affected organizations, raising fears that data on thousands of government employees may have been compromised.

Publisher: U.S.
Date: 2021-02-02T18:43:32Z
Author: Christopher Bing Jack Stubbs Raphael Satter Joseph Menn
Twitter: @Reuters
Reference: (Read more) Visit Source



Hackers Lurked in SolarWinds Email System for at Least 9 Months, CEO Says - WSJ

It is the latest development in the eight-week investigation into one of the worst breaches in U.S. history. SolarWinds, previously a little-known but critical maker of network-management software, is still trying to understand how the hackers first got into the company's network and when exactly that happened.

One possibility is that the hackers may have compromised the company's Office 365 accounts even earlier and then used that as the initial point of entry into the company, although that is one of several theories being pursued, Mr. Ramakrishna said.

Publisher: WSJ
Date: 2021-02-03T02:06:00.000Z
Author: Robert McMillan
Twitter: @WSJ
Reference: (Read more) Visit Source



Other things to check out:

North Korea targeted cybersecurity researchers using a blend of hacking and espionage

North Korean hackers have staged an audacious attack targeting cybersecurity researchers, many of whom work to counter hackers from places like North Korea, Russia, China and Iran. The attack involved sophisticated efforts to deceive specific people, which raises the level of social engineering, or phishing attacks, and enters the realm of spy tradecraft.

The attack, reported by Google researchers , centered on fake social media accounts on platforms including Twitter. The fake personas, posing as ethical hackers, contacted security researchers with offers to collaborate on research . The social media accounts included content about cybersecurity and faked videos purporting to show new cybersecurity vulnerabilities.

logo
Publisher: The Conversation
Author: Paulo Shakarian
Twitter: @ConversationUS
Reference: (Read more) Visit Source



Chinese Hackers Exploit SolarWinds To Steal Federal Payroll Info: Report

Suspected Chinese hackers took advantage of another SolarWinds software vulnerability to compromise computers at the National Finance Center and other U.S. government agencies, Reuters reported.

FBI investigators recently found that the National Finance Center—a federal payroll agency inside the U.S. Department of Agriculture—was among the agencies impacted by a Chinese hack of SolarWinds that also took place last year, Reuters said, citing people familiar with the matter. Investigators fear that data on thousands of government employees may have been compromised in the attack, Reuters said.

Publisher: CRN
Date: February 02 2021 04:19 PM EST
Author: Michael Novinson
Reference: (Read more) Visit Source



Some Victor schools reopen Friday after hackers request ransom in cyber attack | RochesterFirst

VICTOR, N.Y. (WROC) — Some Victor students will be able to return to school Friday, after servers in the district were compromised by Ransomware from an outside source on Saturday. The Victor Central School District has been closed since Monday

* * *

We are able to open up in-person school for the ECS and the VPS Gold Cohort students tomorrow (Friday). Our phone system is up and running along with our emergency alarms. There is still no internet in our buildings so teachers will be working with students without computers. The leadership staff is finalizing the process to make sure emergency numbers are accessible for staff.

Publisher: RochesterFirst
Date: 2021-02-03T22:57:22 00:00
Author: Kayla Green
Reference: (Read more) Visit Source



Hackers keep stealing highly coveted Instagram usernames

A New York Times report sheds light on Instagram's increased efforts to tackle hackers who steal usernames and then proceed to sell and trade them right under the Facebook-owned network's noses. The company has been working to spot these hackers and slap them with warnings and bans. It's a fascinating glimpse inside the social network that has become a bizarre black market for financially struggling social media users.

It's a bazaar of usernames where cybercriminals take these coveted @s and sell them as O.G. usernames while growing their own pages. Meme pages, in particular, are hotspots for such activity. For Instagram, it's a broad campaign of inauthentic behavior, manipulation, and scam plus spam.

logo
Publisher: Input
Twitter: @inputmag
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment