State-sponsored cyberattacks have increased in recent years. These attacks, which are supported and funded by foreign governments, typically reflect geopolitical dynamics, with hacking campaigns often emerging following international conflicts. Frequently, the nations responsible for cyberattacks seek to achieve specific goals through their hacking campaigns. Their objectives may include conducting economic espionage or disrupting another nation’s political or economic stability.
Read more »Tag: hacking
-
Remaining Vigilant Against State-Sponsored Cyberattacks Posted on: April 15, 2020 In: Data Privacy & Cybersecurity
-
How to Protect Yourself from Zoom-Hijacking Posted on: April 09, 2020 In: COVID-19 Response
On March 30, 2020, the FBI announced that it has received multiple reports of video-teleconferencing (VTC) hijacking attacks in recent weeks. The attacks target the VTC platform Zoom and involve unidentified individuals joining online meetings and disrupting them with pornographic and/or hate images and speech. This type of attack is being referred to as “Zoom-bombing.”
Read more »
-
Tax Return Theft: Tips for Prevention and Response Posted on: January 06, 2020 In: Data Privacy & Cybersecurity
As the Internal Revenue Service warned tax professionals in November, malicious actors are currently attempting to hack into tax preparers’ networks to steal 2020 tax return information. If you are a professional tax preparer, you are a target – regardless of the size of your business.
Read more »
-
Threat Intelligence: Maze Ransomware Variant Posted on: December 09, 2019 In: Data Privacy & Cybersecurity
While ransomware variants like GandCrab, Ryuk, and WannaCry have received a lot of attention and cost their victims significant amounts of money, these attacks are rarely accompanied by a credible threat to expose sensitive data. These threat actors are able to monetize their attacks with the extortion payments alone. However, a variant known as Maze (or ChaCha) could change that equation.
Read more »
-
Ransomware Attack Trends: Tips for Prevention & Response Posted on: September 09, 2019 In: Data Privacy & Cybersecurity
Ransomware continues to cause severe disruptions and the loss of critical data within business information systems. It is also leveraging the use of certain providers and tools to increase its devastation and profit.
Read more »
-
A Human Resources Challenge – The Insider Threat To Data Assets Posted on: June 10, 2019 In: Labor & Employment
On April 23, 2019, a privacy notification by the FBI stated that U.S. businesses are reporting a significantly increased amount of data loss as a result of insider threat actors. Companies should not assume that this warning falls squarely within the domain of their Information Technology or Chief Information Security Departments. The vast majority of data-loss incidents have a human component, so what can HR departments contribute to minimize the “Insider Threat”?
Read more »
-
The Threat Sitting Next To You: Defending Cyber Insider Attacks Posted on: May 03, 2019 In: Data Privacy & Cybersecurity
Each year, companies wisely invest in advanced perimeter security devices and software to secure their electronic data and thwart cyber attacks. Unfortunately, despite that well-reasoned approach, the greatest threat to data security may be someone within the organization’s own walls.
Read more »
-
Emerging Trend: Managed Service Providers Targeted with Ransomware Posted on: March 25, 2019 In: Data Privacy & Cybersecurity
An emerging cyber-attack trend is shifting the paradigm for both cyber-preparedness and incident response: ransomware attacks targeting managed service providers. This is, in part, because the size of these attacks can be an order of magnitude larger in terms of the number of entities that are simultaneously affected, and because of the corresponding large-scale efforts that must be undertaken to swiftly and effectively remediate these attacks.
Read more »
-
It’s a Bird, It’s a Plane, No… It’s Cryptojacking! Posted on: February 27, 2019 In: Data Privacy & Cybersecurity
You attempt to log on to your computer, but it is non-responsive. Other users are also having trouble logging on. The system becomes so slow that it is non-functional. Is it an encryption attack? Is there some sort of malware affecting the network that will result in some form of extortionate demand? Or is it something else? Could it be that someone has “cryptojacked” the network?
Read more »
-
Modlishka – Exploiting Two-Factor Authentication Posted on: January 22, 2019 In: Data Privacy & Cybersecurity
Two-factor authentication (2FA) is a commonly used means of securing access to website accounts through easily understood login procedures. Once the user provides the required information, whether a password or site generated code, a session cookie is generated and a secure session is established between the user and the site. But what if an unauthorized person eavesdrops and collects the 2FA information or session cookie?
Read more »
-
Cybersecurity Resolutions for 2019 Posted on: December 28, 2018 In: Data Privacy & Cybersecurity
A new year is upon us, which means people across the world will resolve to exercise more, eat healthier, eliminate financial debt and, most importantly, enhance their cybersecurity over the coming year. More than the typical New Year’s resolutions, improving your individual and corporate cybersecurity defenses can be easier to achieve and sustain. With that in mind, here are a few cybersecurity resolutions to add to your new year’s list, and a few tips for achieving them in 2019.
Read more »
-
The Meltdown and Spectre Bug Posted on: January 24, 2018 In: Data Privacy & Cybersecurity
2018 kicked off with security researchers finding two serious security flaws in chips used in personal computers and mobile devices. The two flaws or bugs, named “Meltdown” (computers) and “Spectre” (mobile devices), make data stored in individual devices vulnerable to attack by allowing hackers to access and steal passwords, encryption keys, or other sensitive information from the device’s memory.
Read more »