French digital automation and energy management giant Schneider Electric is investigating a data breach after a hacker claimed they stole dozens of gigabytes and demanded a hefty ransom in Baguettes, a classic popular French bread item.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
CISA and the "Five Eyes" national intelligence agencies have issued their annual advisory on the top exploited vulnerabilities for the prior year, and its findings bolster some other recent reports that a successful attack is becoming increasingly likely to be the result of a zero-day.
Banks' current measures against cyber fraud are falling short – and the numbers don’t lie. With a hyperactive threat landscape, what steps should financial institutions take to maximize cybersecurity?
A Nokia security breach has leaked source code from a third-party software development partner, exposing the company’s sensitive data, including keys and hardcoded credentials.
Attackers are targeting the DocuSign APIs to generate large amounts of fake invoices, which often skirt automated security and land in inboxes as they originate from "docusign.net" and appear to be coming from legitimate companies.
The Five Eyes Intelligence Alliance has published security guidance to help tech startups protect their innovations from nation-state threat actors and other hackers.
The campaign was conducted by malicious hackers who sold the stolen credentials off, with much of the info being put to use in spam and phishing campaigns. The attack simply made use of open-source tools to scan IP ranges for potentially vulnerable Git config files.
Chinese hackers have attempted to interfere in US elections before. Anonymous official sources have spoken out claiming that this year's free-ranging espionage campaign is seeking phone data from senior officials and leading candidates regardless of party affiliation.
Microsoft has warned of an ongoing spear phishing campaign for intelligence gathering by the Russian state-linked threat actor Midnight Blizzard.
As early as late July, Delta CEO Ed Bastian was threatening CrowdStrike with a lawsuit to recoup some of its estimated $500 million in losses from flight disruptions. CrowdStrike has filed its own suit pointing to Delta's slow recovery from the IT outage.