Hackers Demanded $8K from Sacramento Regional Transit after Attack

Hackers demanded a ransom of approximately $8,000 after they attacked the Sacramento Regional Transit’s (SacRT) computer system. The attack occurred on 18 November, reports The Sacramento Bee, when unknown hackers defaced the public transportation agency’s main website with the following message: I’m sorry to modify the home page, i’m good hacker, i I just want … Read More The post Hackers Demanded $8K from Sacramento Regional Transit after Attack appeared first on The State of Security.
Read more

Australian Broadcasting Corporation Leaked Data through AWS S3 Bucket

The Australian Broadcasting Corporation (ABC) leaked sensitive data online through a publicly accessibly Amazon Web Services (AWS) S3 bucket. Public search engine Censys indexed the misconfigured asset on 14 November during a regular security audit of the S3 environment. Researchers at the Kromtech security center don’t know who might have accessed the AWS S3 bucket … Read More The post Australian Broadcasting Corporation Leaked Data through AWS S3 Bucket appeared first on The State of Security.
Read more

What Is Vulnerability Management?

Enterprise networks regularly see change in their devices, software installations, and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate such risk by implementing foundational security controls. For example, enterprises can monitor their important files for change using file integrity monitoring (FIM). This security measure enables IT security teams to … Read More The post What Is Vulnerability Management? appeared first on The State of Security.
Read more

Scammers Steal S$80K from Woman Using Fake Police Website

Scammers stole S$80,000 from a woman by tricking her into visiting a fake phishing website for the Singapore Police Force (SPF). On 13 November, local law enforcement received a report from the woman that someone had stolen several thousand Singapore dollars from her bank account. She told investigators that the trouble started sometime earlier when … Read More The post Scammers Steal S$80K from Woman Using Fake Police Website appeared first on The State of Security.
Read more

Spam Bots Incorporated Star Wars Quotations into Attack Requests

Several thousand spam bots incorporated quotations from a Star Wars novel into the attack messages they sent out to their targets. The assault began on 10 October 2017. 33 unrelated domains on security CDN Incapsula’s network received approximately 275,000 WinHTTP POST requests leading up to 16 October. The next week, those numbers jumped up to … Read More The post Spam Bots Incorporated Star Wars Quotations into Attack Requests appeared first on The State of Security.
Read more

Microsoft Fixes 17-Year-Old Arbitrary Code Execution Bug in Office Suite

Microsoft has patched a 17-year-old bug hidden in its Office suite that attackers can use to execute arbitrary code on vulnerable machines. The vulnerability resides in Microsoft Equation Editor (EQNEDT32.EXE). It’s a component that allows users to insert and edit equations into Microsoft Word documents as an Object Linking and Embedding (OLE) item. This object … Read More The post Microsoft Fixes 17-Year-Old Arbitrary Code Execution Bug in Office Suite appeared first on The State of Security.
Read more

Cryptocurrency Miner among October’s 10 Most Wanted Malware

A cryptocurrency miner has earned its place on a list of the top 10 most wanted malware for the month of October 2017. The browser-mining service in question goes by the name “CoinHive.” It’s a piece of JavaScript that site owners can embed into their websites. Whenever a user visits their domain thereafter, CoinHive will … Read More The post Cryptocurrency Miner among October’s 10 Most Wanted Malware appeared first on The State of Security.
Read more

Activists Hack ‘Secure’ ISIS Mailing List and Publish 2K Subscribers Online

A group of Muslim activists hacked a ‘secure’ mailing list used by the ISIS terrorist group and published 2,000 of its email subscribers online. On 10 November, a spokesperson for Amaq, one of the Islamic State’s key outlets for communicating with its supporters and members, sent out an email written in Arabic to its subscribers. … Read More The post Activists Hack ‘Secure’ ISIS Mailing List and Publish 2K Subscribers Online appeared first on The State of Security.
Read more

Unthinkable! Hackers Loot Charity’s Funds Right Before Christmas Season

Hackers have done the unthinkable by making off with a charity’s funds right before the start of the 2017 Christmas season. The Utah Association for Intellectual Disabilities (UAID) first noticed something was wrong when it had not received any new email applications for help since 22 October. Typically, the charity gets numerous applications in preparation … Read More The post Unthinkable! Hackers Loot Charity’s Funds Right Before Christmas Season appeared first on The State of Security.
Read more

What Is File Integrity Monitoring?

Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during a patch cycle; some cause concern by their unexpected nature. Organizations commonly respond to such dynamism by investing in asset discovery and secure configuration management (SCM). These foundational … Read More The post What Is File Integrity Monitoring? appeared first on The State of Security.
Read more
Page 1 of 812345...Last »