#cyber attacks

[ follow ]
#cyber-attacks

Leak of 26 billion records may prove to be 'mother of all breaches' | Computer Weekly

The discovery of 12TB of stolen PII and credentials could be the biggest leak in history.
The data appears to have been compiled by an initial access broker and could be used for identity theft and cyber attacks.

Cyber criminals hack Internet users with advertising tools - HP

Cyber criminals optimize attacks using advertising tools
Increase in malware distribution via PDF files

Stopping cyber attackers from targeting the weakest links in security

Businesses face increasing cyber threats worldwide, requiring a holistic defense strategy to combat evolving attack tactics.

UK and US accuse China of malicious' global cyber attacks

China accused of global cyber attacks by UK and US
Targets include politicians, dissidents, and critics of Chinese regime

CISA, FBI warn on risks of China-made drones

Chinese-manufactured drones pose security risks to critical infrastructure
Guidance highlights vulnerabilities in data transfer, patching, and firmware updates

NCSC Warns That AI is Already Being Used by Ransomware Gangs

Malicious attackers are using artificial intelligence (AI) for more effective cyber attacks, and the volume and impact of threats will increase in the next two years.
AI tools make it easy to generate believable text, images, audio, and deepfake videos that can be used to deceive targets.

Leak of 26 billion records may prove to be 'mother of all breaches' | Computer Weekly

The discovery of 12TB of stolen PII and credentials could be the biggest leak in history.
The data appears to have been compiled by an initial access broker and could be used for identity theft and cyber attacks.

Cyber criminals hack Internet users with advertising tools - HP

Cyber criminals optimize attacks using advertising tools
Increase in malware distribution via PDF files

Stopping cyber attackers from targeting the weakest links in security

Businesses face increasing cyber threats worldwide, requiring a holistic defense strategy to combat evolving attack tactics.

UK and US accuse China of malicious' global cyber attacks

China accused of global cyber attacks by UK and US
Targets include politicians, dissidents, and critics of Chinese regime

CISA, FBI warn on risks of China-made drones

Chinese-manufactured drones pose security risks to critical infrastructure
Guidance highlights vulnerabilities in data transfer, patching, and firmware updates

NCSC Warns That AI is Already Being Used by Ransomware Gangs

Malicious attackers are using artificial intelligence (AI) for more effective cyber attacks, and the volume and impact of threats will increase in the next two years.
AI tools make it easy to generate believable text, images, audio, and deepfake videos that can be used to deceive targets.
morecyber-attacks

Neighbouring Kent councils hit by simultaneous cyber attacks | Computer Weekly

Three local authorities in Kent, UK have been hit by cyber attacks, causing disruptions to public-facing systems.
The affected councils are working with the National Cyber Security Centre to respond to the incidents and restore services.
The attacks bear similarities and may be linked, indicating a potential ransomware incident.

UK, US accuse Russia of cyber-espionage campaign against top politicians

The UK government and the United States have accused Russian security services of engaging in a cyber-espionage campaign against politicians and organizations.
Losses from cyber attacks in 2018 amounted to at least $45 billion, according to a report.

No 10 urged to investigate targeting of MPs and others by Russian spies

Russian state spies have targeted British MPs, peers, civil servants, and journalists with cyber-attacks for the last eight years.
The UK government believes that the hacking group Star Blizzard, linked to the Russian FSB, was behind several high-profile cyber-attacks, including the leak of US-UK trade talk papers in 2019.

Iran terrorist crew broke into 'multiple' US water systems

Iran-linked cyber thugs have exploited Israeli-made programmable logic controllers (PLCs) used in multiple water systems and other operational technology environments in the US.
The cyber criminals likely gained access to the PLCs by using default passwords for internet-accessible systems.
No operational systems at the water facilities have been impacted and safe drinking water has not been compromised.

Prepare for your worst day: How to create a cyber incident response plan | Computer Weekly

Cyber threats and attacks are increasing in frequency and sophistication.
Organizations need to be prepared and have a plan in place to respond to cyber incidents.
Time is of the essence in responding to a cyber incident.

Reading Borough Council apologizes for dodgy infosec advice

Reading Borough Council faced criticism for recommending users disable HTTPS on its planning portal.
The council has since fixed the issue and apologized for the incorrect information.
HTTPS provides better security by encrypting sensitive data and protecting against cyber attacks.
[ Load more ]