Feb 28, 2020 | Cloud Consultancy News
Researchers have uncovered a new business email compromise (BEC) threat actor, which they call Exaggerated Lion, targeting thousands of U.S. companies with money pilfering scams. The cybercrime ring is unique in its leveraging of Google’s cloud-based productivity...
Feb 27, 2020 | Cloud Consultancy News
The Danish Ministry of Industry, Business and Financial Affairs recently published its Cyber and Information Security Strategy for the Maritime Sector. The strategy is part of the Danish government’s national strategy for cyber and information security and contains...
Feb 26, 2020 | Cloud Consultancy News
The UK Department for Transportation has updated their Cyber Security for Ports and Port Systems good practice guide. This updates the previous 2016 version, and provides actionable advice on: developing a cyber security assessment and plan for important assets,...
Feb 25, 2020 | Cloud Consultancy News
French sporting retail giant Decathlon has become the latest big brand to expose user data via a misconfigured database, leaking over 123 million records including customer and employee information, according to researchers. A team at vpnMentor uncovered the 9GB...
Feb 25, 2020 | Cloud Consultancy News
In the last few decades, the maritime and offshore industries have gone through some considerable changes, globally. As most of the operations and proceedings of this industry have been evolving to a faster, better, and developed methodology, that is, digital...
Feb 24, 2020 | Cloud Consultancy News
The 50,000 ships sailing the sea at any one time have joined an ever-expanding list of objects that can be hacked. Cybersecurity experts recently displayed how easy it was to break into a ship’s navigational equipment. This comes only a few years after researchers...
Feb 23, 2020 | Cloud Consultancy News
The Cybersecurity and Infrastructure Security Agency (CISA) encourages asset owner operators across all critical infrastructure sectors to review the below threat actor techniques and ensure the corresponding mitigations are applied. CISA responded to a cyberattack...
Feb 21, 2020 | Cloud Consultancy News
UK marine engineering consultancy London Offshore Consultants (LOC) Group has been hacked by a group known as Maze. The company, with more than 400 employees, saw its computers frozen on December 30 with hackers then demanding a ransom to unlock them. The hackers...
Feb 21, 2020 | Cloud Consultancy News
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. While these companies approve an average of 41 cloud services each, up 33 percent from last year, thousands of other services are used ad-hoc without vetting. In...
Feb 20, 2020 | Cloud Consultancy News
The tech giant reported impressive revenue in everything but gaming. Microsoft CEO Satya Nadella spoke with investors on the company’s quarterly earnings call to share some numbers about Microsoft’s performance in the second quarter of the 2020 fiscal...
Feb 19, 2020 | Cloud Consultancy News
Avast is harvesting users’ browser histories on the pretext that the data has been ‘de-identified,’ thus protecting your privacy. But the data, which is being sold to third parties, can be linked back to people’s real identities, exposing every...
Feb 18, 2020 | Cloud Consultancy News
The DoppelPaymer Ransomware is the latest family threatening to sell or publish a victim’s stolen files if they do not pay a ransom demand. A new tactic being used by ransomware operators that perform network-wide encryption is to steal a victim’s files...
Feb 17, 2020 | Cloud Consultancy News
9,050,064,764 credentials have been recovered throughout 2019 which came from a total of 640 unique data breaches and include email addresses connected to plaintext passwords and usernames with plaintext passwords, SpyCloud reveals. That means, on average, each of...
Feb 16, 2020 | Cloud Consultancy News
What you need to know A newly discovered variant of the Emotet Trojan can hop from Wi-Fi network to Wi-Fi network. Emotet is a malware that can steal personal information, install ransomware, download other pieces of malware, and form botnets. The key to stopping it...
Feb 15, 2020 | Cloud Consultancy News
A Swiss company thought to have sold among the most secure encryption products in the world was actually owned by US and German intelligence, allowing the CIA and BND to spy on allies and enemies around the world, it has emerged. A new report from The Washington...
Feb 14, 2020 | Cloud Consultancy News
Several cybersecurity companies have spotted campaigns that use coronavirus-themed emails to deliver malware, phishing attempts and scams. The new coronavirus outbreak, which started in China, has made a lot of headlines recently and has caused global panic. Over...
Feb 13, 2020 | Cloud Consultancy News
Average loss per BEC scam amounted to nearly $75,000, per complaint, on average. The FBI received 467,361 internet and cyber-crime complaints in 2019, which the agency estimates have caused losses of more than $3.5 billion, the bureau wrote in its yearly internet...
Feb 12, 2020 | Cloud Consultancy News
Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging cyber threat. The first examples of deepfakes seen by the general public were mainly amateur...
Feb 11, 2020 | Cloud Consultancy News
It’s generally been accepted that Mac systems are much safer than Windows, but that could be starting to change as a new report shows Mac threats are growing faster than their Windows counterparts for the first time ever. Malwarebytes latest annual State of...
Feb 11, 2020 | Cloud Consultancy News
93 percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released by Upstream. The number of malicious apps discovered in 2019 rose to 98,000, up from 63K in 2018....
Feb 10, 2020 | Cloud Consultancy News
Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised...
Feb 7, 2020 | Cloud Consultancy News
The United Nations’ European headquarters in Geneva and Vienna were hacked last summer, putting thousands of staff records at miscreants’ fingertips. Incredibly, the organization decided to cover it up without informing those affected nor the public. That is...
Feb 6, 2020 | Cloud Consultancy News
Apple has released macOS Catalina 10.15.3, which includes bug fixes and security updates to the Mac Catalina operating system. Separately, Mac users running Mojave or High Sierra will find new Security Updates available for those respective operating systems....
Feb 5, 2020 | Cloud Consultancy News
A British community housing charity was conned out of more than $1m in a domain spoofing and contractor impersonation scam. Red Kite Community Housing announced on Tuesday that it had fallen victim to a cyber-scam in which criminals posed as genuine service providers...
Feb 4, 2020 | Cloud Consultancy News
The new Microsoft Edge browser, based on the Chromium project used by Google Chrome, brings a better browsing experience to Windows 10 PCs. One unique feature is the ability to use extensions from both Microsoft and Chrome Web Store. Here’s how to install and use...
Feb 3, 2020 | Cloud Consultancy News
Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. Complex investigation The six-month investigation...