Advanced Penetration Testing -Week-1 Advanced Penetration Testing -Week-2 Advanced Penetration Testing -Week-3 Advanced Penetration Testing -Week-4 Advanced Penetration Testing -Week-6 Advanced Penetration Testing -Week-7 Advanced Penetration Testing -Week-9 Advanced Penetration Testing -Week-10 Advanced Penetration Testing -Week-11Advanced Penetration Testing -Week-12
Fake News has been a major topic during the 2017 post-American Presidential election season due of its potential roles in the voting outcomes. This is an area that Facebook, Google and other major technology companies decide to tackle because of the negative impact Fake News plagues to their reputations. Fake News emerges as a new form of manipulation to control elections, vehiculate propagandas, and so forth.
In the wake of combating Fake News, Russia seems to show signs as one of the government systems to take full advantage of Fake News. In the line of this idea, Huffington Post’s Willa Frej writes “Russia Spread Fake News And Disinformation In Sweden, Report Finds.” In the Article, the reporter elaborates that experts determined that a series of forged letters, Fake News items tactics have peppered the Swedish information landscape started three years ago, after the Russian annexation of Crimea from Ukraine.
You may access the full article via the link below.
Anonymous Indian hackers claim to have leaked database of 1.7 million Snapchat users, which they hacked last year. Indian hackers are among the top Bug Bounty hunters in the world working of IT giants finding bug in their system. Hackers said they had found the bug earlier but never used the data but ‘arrogance’ of the Snapchat CEO had miffed them.
The move by the hackers came in retaliation to Snapchat’s CEO Evan Spiegel’s remark on expanding the business to ‘poor countries’ like India. According to Indian hackers, they had found vulnerability in Snapchat database last year and had siphoned details of 1.7 million users. Hackers leaked and made this data based available on the darknet to mark their resentment against company’s remark for India. They have further threatened to carry out intensive strike against company on the virtual world till the CEO apologies for his remark.Indian users began uninstalling the app and downgrading its rating to a single star on the app store
The company, WordFence, reported that tens of thousands of routers, associated with the state-owned telecom company Telecom Algeria, have been hacked and used to launch attacks on wordpress sites. The researchers from the firm also identified up to 27 ISPs from various countries to have their routers involved in this hacking. The vulnerability was the result of ISPs listening on port 7547, used to manage customer’s devices, were running a vulnerable web server, AllegroSoft RomPager. WordFence has reported to have seen more than 90k unique IP address from a total of 28 ISPs to have become compromised.
This article is about the heavy distribution Cerber ransomeware and how it has taken over Locky in the last three months of the top ransomware threat. Cerber is “ransomeware as a service” which allows novice users to pay for it to be used against targets.
The article emphasized that controls inside the perimeter are key to defending against malware such as Cerber because it is able to sneak past endpoint- and malware-detection technologies. For example, least privilege access control is key to defending against this ransomeware because it crawls the network looking for accessible file systems and encrypting its contents.
This is an example of the importance of having a defense in depth approach to information security.
CIA spying tools exposed by WikiLeaks have been linked to hacking attempts on at least 40 targets in 16 countries, according to Symantec. Symantec is reporting that the tools are similar with the tactics from an espionage team named Longhorn. Longhorn has been active since at least 2011, and they use Trojan programs and previously unknown software vulnerabilities to exploit targets. Symantec stated that some of these targets are government and organizations in the financial, telecom, IT and aerospace sectors. Some of the victim’s computers were in the Middle East, Europe, Asia, Africa and even in the US, where the CIA is not allowed to conduct electronic surveillance.
A cyber group has been targeting Middle Eastern organization using Windows and Android malware. The group, discovered by Chinese security firm and researchers from Palo Alto Networks, have been targeting educational and military organizations from Palestine to Egypt. The main method of delivering the malware was through fake news websites and phishing emails containing bit.ly shortened links. The malware enables hackers to steal passwords, take screenshots, and log keystrokes. The exact count of victims haven’t been determined, but researchers from Palo Alto have come to a conclusion that these attacks were mostly done by a group of attackers, instead of a lone wolf.
Cybercriminals for five hours one day took over the online operations of a major bank and intercepted all of its online banking, mobile, point-of-sale, ATM, and investment transactions in an attack that employed valid SSL digital certificates and Google Cloud to support the phony bank infrastructure. The attackers also obtained valid digital certificates for their poser bank’s servers via Let’s Encrypt, a legitimate HTTPS certificate provider, to dupe customers who, when they logged into their online accounts, were redirected to the phony systems.The bank didn’t deploy the two-factor authentication option offered by Registro.br, which left the financial institution vulnerable to an authentication-type attack as well as authentication-type flaws such as CSRF. This was a major bank heist, as this bank has $25 billion in assets, 5 million customers worldwide, and 500 branches in Brazil, Argentina, the US, and the Cayman Islands. According to the article many more banks are at risk; most banks in Latin America rely on a third-party DNS provider for their infrastructure, and at least half of the top 20 largest banks in the world use DNS providers for some or all of their DNS infrastructure.
There has been this constant question in my mind about why healthcare records are so valuable to criminals and what would a criminal do by knowing the health history of some unknown persons.But here lies the answer to it.
Stealing EHRs is better for cybercriminals than stealing credit cards, which can be used only until the card expires, is maxed out or canceled.An EHR database containing PII that do not expire — such as Social Security numbers — can be used multiple times for malicious intent.Stolen EHR can be used to acquire prescription drugs, receive medical care, falsify insurance claims, file fraudulent tax returns, open credit accounts, obtain official government-issued documents such as passports [and] driver’s licenses, and even create new identities.”Another important statistic that helps explain why cybercriminals are attracted to EHR data is that 91 percent of the U.S. population has health insurance. It’s no wonder, then, that 113.2 million healthcare-related records were stolen in 2015