In their attempt to extort as much money as quickly as possible out of companies, ransomware gangs know some effective techniques to get the full attention of a firm’s management team.And one of them is to specifically target the sensitive information stored on the computers used by a company’s top executives, in the hope of finding valuable data
As a cybersecurity professional, how numb have you become to vendors who try to scare you with frightening statistics in an effort to sell you a new product? It is understandable that a vendor has to present as much information in a limited amount of attention-grabbing time, so their doomsday technique makes some sense. Perhaps the vendors’ approac
Education in the United States faced a crisis this year. The looming threat of the coronavirus—which spreads easily in highly-populated, enclosed rooms—forced schools across the country to develop new strategies for education.
The dramatic stress of this transition is known. Teachers are working more hours than ever and parents are pulled between their jo
Embraer, a Brazilian manufacturer of aircraft, has disclosed that hackers managed to breach its computer systems, and steal data.Although Embraer may not be a household name, it is the world’s third-largest producer of civil aircraft (after Boeing and Airbus), having delivered more than 8,000 aeroplanes to date.According to a press release issued by th
The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.”However, some believe that their connections to North Korea might be a false flag intending to hide the
So, you’re a ransomware gang and you want to ensure that you have caught the attention of your latest corporate victim.You could simply drop your ransom note onto the desktop of infected computers, informing the firm that their files have been encrypted.Too dull?You could lock infected PCs and display a ghoulish skull on a bright red background (most r
An undisclosed number of customers of outdoor clothing retailer The North Face have had their passwords reset by the company, following a credential-stuffing attack.The company has revealed that on October 9, 2020, it became aware that hackers had used usernames and passwords stolen from a third-party website to gain unauthorised access to customer accounts.
The Australian Government is committed to protecting the essential services all Australians rely on by uplifting the security and resilience of critical infrastructure.Increasingly interconnected and interdependent critical infrastructure is delivering efficiencies and economic benefits to operations. However, connectivity without proper safeguards creates v
The audience in the room is weirdly quiet. The contestant is in a small plexiglass booth with nothing but a phone, a laptop computer and some notes. On a set of speakers outside, the booth broadcasts the sounds of a dial tone as a woman on the stage begins to dial a number. It is apparent she is not phoning a friend. The dial tone changes to a ring tone, and
In 2020, car manufacturer Honda fell victim to a ransomware attack. Using a payload called “update.exe,” the attack crippled Honda’s international customer service and Financial Services wing for days. Although it affected two customer facing branches of this global corporation, the ransomware was designed to target and breach Honda’s critical ICS/SCADA envi
It’s hard not to say that 5G technology brings a lot of benefits. 5G entails faster download speeds, and yes, if you have a 5G-enabled handset, you could hear and appreciate the speed increases for videos, gaming, etc. However, 5G provides added benefits that go way above those for the everyday user.Let’s take a look at the high speed and low latency of 5G.
Right now, many countries are in a state of alarm, and people and organizations around the world are coming together to face the current coronavirus COVID-19 pandemic. Companies are also making efforts to streamline the adoption of new methodologies such as telecommuting in order to protect their employees’ health.
However, it also also the case that t
It’s an unfortunate reality that cyber attacks on the U.S. 2020 election are likely to happen. However, while this is a potent threat to democracy, an even greater threat is to not take the necessary actions to prevent these attacks until it is too late.There are many different types of cyberattacks that the U.S. 2020 election could face.Attacks on electroni
Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. The purpose of threat modeling is to provide defenders with a systematic analysis of the probable attacker’s profile, the most likely attack vectors and the assets most desired by an attacker. Ef
byDanny BradburyRansomware attacks don’t discriminate. They are just as happy targeting those with four legs as those with two.Anonymous sources told cybersecurity reporter Brian Krebs this week that National Veterinary Associates (NVA) has fallen victim to a ransomware attack that has affected hundreds of hospitals.NVA describes itself as one of the l