ANCIBE

Noticias Information Security Buzz (English)

Hackers Behind ‘Triton’ Malware Target Electric Utilities In US
Publicado el: Tuesday June 18, 2019

It has been reported that Xenotime, the threat actor behind the 2017 Trisis/Triton malware attack, is now targeting — in addition to oil and gas organizations — electric utilities in the United States and the Asia-Pacific (APAC) region. Xenotime initially appeared to target only the oil and gas sector in the Middle East, but Dragos reported in May 2018 …

The ISBuzz Post: This Post Hackers Behind ‘Triton’ Malware Target Electric Utilities In US appeared first on Information Security Buzz.


Okta Research Shows Workers Are Ready To Go Passwordless This Year
Publicado el: Tuesday June 18, 2019

 Okta’s Passwordless Future Report finds:  78% of all respondents admit to using insecure methods to help them remember passwords  69% of UK workers feel stressed or annoyed as a result of forgetting a password, a worrisome statistic considering the importance of mental health in the workplace  More than three in five workers say they would benefit from biometrics in the workplace, but 86% …

The ISBuzz Post: This Post Okta Research Shows Workers Are Ready To Go Passwordless This Year appeared first on Information Security Buzz.


Expert Comment: Russia & US Power Grid Cyberwar
Publicado el: Tuesday June 18, 2019

The US and Russia are currently locked in a series of escalating cyber-attacks, with the US reportedly attacking Russia’s power grids and the Kremlin responding with a warning of potential cyberwar.  CHILD: "What started the cyber wars, daddy?" FATHER: "…..A New York Times article." https://t.co/4X9bIkDGoO — Greg Otto (@gregotto) June 17, 2019 Expert Comments:  Dr Darren Williams, …

The ISBuzz Post: This Post Expert Comment: Russia & US Power Grid Cyberwar appeared first on Information Security Buzz.


New Echobot Malware Spreads Via 26 Different Exploits
Publicado el: Monday June 17, 2019

According to this link, https://www.zdnet.com/article/new-echobot-malware-is-a-smorgasbord-of-vulnerabilities/, security researchers have found a new Mirai variant called Echobot that targets a wide range of IoT devices and enterprise apps.  Echobot is based on Mirai malware, like hundreds of other botnets that emerged once the source code became publicly available  Uses 26 exploits to propagate  The targets of the latest Echobot variant include network-attached storage …

The ISBuzz Post: This Post New Echobot Malware Spreads Via 26 Different Exploits appeared first on Information Security Buzz.


Disinformation Effort Targeted At EU Parliament Elections
Publicado el: Monday June 17, 2019

According to Reuters and The FT, who have both seen the report, Russian sources mounted a disinformation effort in order to ‘suppress turnout and influence voter references’ at the elections. Alongside this, both outlets have confirmed that the report calls for social media companies to do better, claiming they fell short in their efforts to tackle malicious …

The ISBuzz Post: This Post Disinformation Effort Targeted At EU Parliament Elections appeared first on Information Security Buzz.


Deepfake Videos Could ‘Spark’ Violent Social Unrest – Comment
Publicado el: Monday June 17, 2019

Yesterday, the Foreign Policy Research Institute stated that deepfake videos could spark violent outbreaks and social unrest. Commenting on this, Kelvin Murray, Senior Threat Researcher at Webroot, believes that deepfakes hold little use in today’s society, but will continue to evolve as more advanced technology becomes available.  Kelvin Murray, Senior Threat Researcher at Webroot:  “Deepfakes create a number of very real …

The ISBuzz Post: This Post Deepfake Videos Could ‘Spark’ Violent Social Unrest – Comment appeared first on Information Security Buzz.


What Is A VPN Protocol And Which One Should You Use?
Publicado el: Monday June 17, 2019

VPN protocols define how data is running between the VPN server and your computer or smartphone. Each VPN protocols has its own specification that provides advantages (and sometimes disadvantages) in a wide variety of circumstances depending on your goals. For example, some VPN protocols focus on download speed, while other protocols prioritize security and privacy. …

The ISBuzz Post: This Post What Is A VPN Protocol And Which One Should You Use? appeared first on Information Security Buzz.


Highly Dangerous Hacking Group Is Now Targeting Power Grids
Publicado el: Monday June 17, 2019

Hackers that tried to interfere with the safety systems of an industrial plant are now looking at power utilities too, according to a cybersecurity company. Dragos identified the XENOTIME activity group expanded its targeting beyond oil and gas to the electric utility sector. This expansion to a new vertical illustrates a trend that will likely continue for other …

The ISBuzz Post: This Post Highly Dangerous Hacking Group Is Now Targeting Power Grids appeared first on Information Security Buzz.


ASCO Industries Hit By Ransomware
Publicado el: Friday June 14, 2019

HelpNet Security reported today that ASCO Industries, a privately held company acquired by Kansas-based Spirit AeroSystems in 2018, has been hit by a ransomware attack that disrupted its production around the world.   Experts Comments:   Tim Erlin, VP, Product Management and Strategy at Tripwire:    “This isn’t the first manufacturer to be hit by ransomware and it won’t be the …

The ISBuzz Post: This Post ASCO Industries Hit By Ransomware appeared first on Information Security Buzz.


Hackers Using Victims To Train Their Malware
Publicado el: Friday June 14, 2019

Outlaw hackers return with cryptocurrency mining botnet. The group is using Chinese victims as guinea pigs to try out their malware. The Outlaw hacking group has reemerged and is once again on the radar of cybersecurity researchers following the detection of a botnet attacking systems to mine for cryptocurrency. The botnet spreads a miner for Monero (XMR).  …

The ISBuzz Post: This Post Hackers Using Victims To Train Their Malware appeared first on Information Security Buzz.