Browsed by
Author: Greg Swiecicki

Honware: IoT honeypot for detecting zero-day exploits

Honware: IoT honeypot for detecting zero-day exploits

Researchers have created a solution called honware, which is a virtual honeycomb structure that can emulate Linux based customer support equipment and IoT devices using the software. This solution can help security researchers and stuff developers detect zero-day exploits targeting Internet connected devices.

https://www.helpnetsecurity.com/2020/02/06/detecting-zero-day-iot-exploits/

German’s drone

German’s drone

Wingcopter, together with partners Merck and the University of Applied Sciences in Frankfurt, launched drones, which completed the first flight of the new application. The goal is to deliver loads instead of trucks or transfer loads between two physically separate offices. The first flight was made about 25 km, taking a sample of pigments from one Merck laboratory in Gernsheim to the headquarters in Darmstadt, Germany.

https://techcrunch.com/2020/02/05/german-drone-delivery-trial-paves-the-way-to-replacing-trucks-for-inter-office-deliveries/

Musical arrangement

Musical arrangement

The perforated card supports the musical arrangement and musical interpretation.

The perforated card is selected in accordance with:

– type of reading (pneumatic or mechanical)

– range (number of notes or keys)

Live and work in a hurry.

Live and work in a hurry.

In the present world, we live and work in a hurry. Making quick decisions can cause a lot of trouble for your business. I think that in the era of ransomware, we should slow down a little and pay more attention to the incoming e-mail, look at who came from, and above all, whether the spelling is right. Clicking without sense can lead to disaster, so sacrificing 2 or 3 minutes can save a company from a big problem. Cybercriminals take advantage of our rush and our routine. I think that taking a few minutes more to become familiar with the leading e-mail is not a waste of time, but a valuable analysis for the good of every company. Training is essential, but if you do not go with thought and observation, it will not help. Let’s slow down just before each click and don’t let cybercriminals rob you or the company.

Malware and ransomware attack volume down due to more targeted attacks

Malware and ransomware attack volume down due to more targeted attacks

According to the SonicWall report, cybercriminals are using more intricate methods to attack companies and consumers. Cyber ​​criminals rely on the encryption of threats, through which traditional standards escape security control. Firewalls that do not have the capacity or computing power to detect, control and mitigate attacks sent via HTTPs traffic.

https://www.helpnetsecurity.com/2020/02/05/ransomware-attack-volume-down/

Malware stew cooked up on Bitbucket, deployed in attacks worldwide

Malware stew cooked up on Bitbucket, deployed in attacks worldwide

Bitbucket is excessively used as a host for crypto miners, ransomware and Trojans are deployed in a single chain of attack. Malicious software was hosted on the Bitbucket version control repository web service. While legitimate hosting services like: Google Drive, GitHub and Dropbox are usually reported by users to quickly remove malicious files. However, the cybersecurity company has stated that a range of user profiles are regularly updated every hour to avoid disruption of forensic operations. More than 500,000 computers have been infected so far in this campaign and so far there are no signs of stopping malicious attacks.

https://www.zdnet.com/article/malware-stew-cooked-up-on-bitbucket-deployed-in-attacks-worldwide/

What makes some organizations more cyber resilient than others?

What makes some organizations more cyber resilient than others?

According to an Accenture report, less than one-fifth of organizations successfully protect themselves against cyberattacks over the past three years. A higher level of investment in advanced security technologies is the result of proper detection and prompt repair of violations.

https://www.helpnetsecurity.com/2020/02/04/cyber-resilient/

Ransomware attacks

Ransomware attacks

According to Emisisoft specialists, the number of ransomware attacks is overgrowing, and additionally, they are carried out in detail. Crisis and panic are becoming more and more cruel to companies. Until now, the worst-case scenario was data loss; the scope of sophisticated blackmail is increasing. At present, the black option is to make the stolen information public on the Internet or to pass it on to other criminal groups. Brett Callow believes that the scale of tactics may be the answer that employees of the IT security segment manage to break ransomware encryption and unlock files. In this case, it is not profitable for companies to pay the ransom; they have to wait to recover lost data. The new ransomware campaign carefully selects its victims, aiming primarily at organizations for which publicizing the data stored in their systems could be a real disaster. The leakiness of fraudsters and intimidation shows their temporary helplessness on IT employees, forcing and inventing newer tactics.

Scientists test forensic methods to acquire data from damaged mobile phones

Scientists test forensic methods to acquire data from damaged mobile phones

Most criminals try very hard to destroy all data, photos and information on the phone. They make all sorts of opportunities from smashing, shooting, to cooking the phone. However, forensic experts manage to recover most of the information they need to investigate. Researchers at the National Institute of Standards and Technology (NIST) are testing options to extract data from a phone using hacking tools that can be legally used in criminal investigations.

https://www.helpnetsecurity.com/2020/02/04/data-damaged-mobile-phones/

Wuhan coronavirus exploited to deliver malware, phishing, hoaxes

Wuhan coronavirus exploited to deliver malware, phishing, hoaxes

Be aware !!!

The spread of the virus is a phenomenal hiatus for cybercriminals. While the virus (Wuhan Coronavirus) is spreading, causing panic in the world, malicious individuals and groups are already taking advantage of the fit situation. Fake messages, malware and phishing messages are starting to appear. IBM X-Force has reported that information about the spread of the virus is provided incorrectly. Be especially careful when opening email related to coronavirus – emails, attachments, posts on social media, text messages.

https://www.helpnetsecurity.com/2020/02/03/wuhan-coronavirus-exploited-to-deliver-malware-phishing-hoaxes/