Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs
Researchers warn of a continuing attack involving the phishing of Office 365 credentials.
Truncated URLs Look to Make Big Dent in Phishing
The Chrom86 browser will be tested with a new design to help thwart phishing attacks.
https://www.darkreading.com/risk/truncated-urls-look-to-make-big-dent-in-phishing/a/d-id/1338969
Real-time Flight Tracking Services Suffered Cyber Attack
Two flight tracking services, Flightradar24.com and Flightaware.com, were victims of a cyber attack.
Chase Cunningham On Internet Safety For Kids And The Cynja
Nobody expected that almost the whole world would switch to distance education overnight. Scientists are alarming that our children currently do not know enough how to use technology responsibly. It is essential to take care of the cyber education of children.
France warns of Emotet attacking companies, administration
The number of Emotet attacks has increased dramatically in the private sector and public administration, according to the French national cybersecurity agency.
Spyware Labeled ‘TikTok Pro’ Exploits Fears of U.S. Ban
‘TikTok Pro’ spyware can hijack standard Android functions as well as create a phishing page to steal data. Typical tasks that can be taken over are taking pictures, reading and sending messages, making calls, and launching applications.
https://threatpost.com/spyware-labeled-tiktok-pro-exploits-fears-of-us-ban/159050/
Ransomware delays first day of school for Hartford, Connecticut
Hartford School District, Connecticut, is struggling with restoring and rebooting systems after the ransomware attack that hit over Labor Day weekend.
CDRThief Malware Targets VoIP Gear in Carrier Networks
The CDRThief malware attacks VoIP softswitches in telecommunications operators’ networks.
https://threatpost.com/cdrthief-malware-voip-gear-carrier-networks/159100/
IT teams fearful of their organization suffering a data breach
“Looking at how businesses get breached, most of the time, employees make a mess while using communication or collaboration tools. In most cases (51 percent), attacks occur through Gmail, Outlook, or similar external email service.”
The biggest problem in implementing the security policy is the management’s wrong approach to the issue. The most common mistake is that the IT department is solely responsible for security. Meanwhile, the company’s management must be primarily responsible for the security policy because it can only be effectively controlled and enforced. The second mistake is that the management staff remains partially or entirely outside the company’s security system, based on the fact that the president or owner can do everything. Meanwhile, it is the remotly working at different times and frequently logging onto the network from outside the office that is the most vulnerable to cybercriminal attacks.
As you can see, the most significant security threat is humans.
https://www.itproportal.com/news/it-teams-fear-their-organization-suffering-data-breach/