Top CyberSecurity News for November 10th 2016

  1. Russian Hackers Launch Targeted Cyberattacks Hours After Trump’s WinFrom Motherboard. 

Merely a few hours after Donald Trump declared his stunning victory, a group of hackers that is widely believed to be Russian and was involved in the breach of the Democratic National Committee launched a wave of attacks against dozens of people working at universities, think tank tanks, NGOs, and even inside the US government.

Around 9 a.m. ET on Wednesday, the hackers sent a series of phishing emails trying to trick dozens of victims into opening booby-trapped attachments containing malware, and clicking on malicious links, according to security firm Volexity, which observed and reported the five attack waves. The targets work for organizations such as Radio Free Europe / Radio Liberty, the Atlantic Council, the RAND Corporation, and the State Department, among others.

Top CyberSecurity News For 28th May 2016

  1. North Korea Linked With Hacks Stealing From BanksFrom US News And World Report. Network security researchers have linked cyber attacks that stole millions of dollars from Asian banks to hacking incidents attributed to North Korea, raising questions as to whether the cash-strapped hermit kingdom is seeking new ways to replenish its coffers.

  2. Did the Clinton Email Server Have an Internet-Based Printer?From Krebs On Security. The Associated Press today points to a remarkable footnote in a recent State Department inspector general report on the Hillary Clinton email scandal: The mail was managed from the vanity domain “clintonemail.com.” But here’s a potentially more explosive finding: A review of the historic domain registration records for that domain indicates that whoever built the private email server for the Clintons also had the not-so-bright idea of connecting it to an Internet-based printer. 

Top CyberSecurity News For 3rd May 2016

  1. US Republican party shuns electronic ballots at open convention. From Politico. The 2016 Republican presidential campaign has been the definition of an instantaneous digital race, complete with micro-targeted Facebook ads, Twitter tirades and ephemeral Snapchat videos. But the biggest moment of the entire GOP contest, at the party’s national convention in Cleveland, is shaping up to be a decidedly low-tech affair.

  2. ISIS hacking division release names and personal details of dozens of American soldiers urging lone wolf attacks. From Daily Mail. ISIS hackers have released the names and personal details of dozens of American military personnel urging supporters to assassinate them. The ‘hit list’ which was published on social media, claimed to include the details of American servicemen who had operated drones responsible for the coalition airstrikes.
  3. Iranian Hacker Arrested for Stealing American Airlines Air Miles Worth $260,000 From Softpedia. Miami police revealed details about a criminal case from 2015 during which officers arrested an Iranian national studying in the US for stealing reward air miles from American Airlines customers worth $260,000. The suspect’s name is Milad Avadzavani, a former Florida International University student, who was arrested last year and is preparing to face trial this summer.
  4. Cybersecurity Professionals Are Using Misdirection To Combat HackingFrom Motherboard. Today, there are many honeypot security programs available with which cybersecurity teams can deploy to draw hackers’ attention wherever they wish it to go. As programming has progressed, honeypots and honeynets have become increasingly etherealized; several virtual machines may all be hosted on a single physical box. But the honeypot approach has its drawbacks. Scalability is the biggest concern–virtual or not, someone has to keep an eye on these systems and corral hackers, and IT teams typically have their hands full managing the regular networks.

  5. What is a firewall? From Palo Alto Networks. A firewall is a network security device that grants or rejects network access to traffic flows between an untrusted zone (e.g., the Internet) and a trusted zone (e.g., a private or corporate network). The firewall acts as the demarcation point or “traffic cop” in the network, as all communication should flow through it and it is where traffic is granted or rejected access. Firewalls enforce access controls through a positive control model, which states that only traffic defined in the firewall policy is allowed onto the network; all other traffic is denied (known as “default deny”).