Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.

Uber Total Loss: 57 Million Records Stolen But Data Breach Was Hidden For A Year

Oh boy. Uber is known for pushing the limits of the law and has dozens of lawsuits pending against it, but this one went too far and now comes the reckoning.

Bloomberg was first to report that hackers stole the personal data of 57 million customers and drivers from Uber, a massive breach that the company concealed for more than a year. Finally, this week, they fired their chief security officer and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000 payment to the attackers to "delete the data". Yeah, sure!

[ALERT] Zombie Remote Access Phishing Trojan Kills Antivirus

Almost two years ago we took note of two different write-ups on the Adwind (aka AlienSpy) remote access trojan (RAT), one by McAfee and the other by Fidelis Security. Those pieces caught our eye not only because they were published so close together but because one particular Adwind variant, Jsocket, had popped on our own radar following the release of the Phish Alert Button (PAB), which enabled our customers' employees to report suspected phishing emails directly to us (as well as their own IT departments) from within Outlook. Then, as now, ransomware dominated the attention of the security industry, understandably so. But the persistence of Adwind, a cross-platform malware-as-a-service offering that has been around since at least 2012, in the phishing emails reported to us by customers made us sit up and take notice.

We're Still Not Ready for GDPR? What is Wrong With Us?

Sara Peters, Senior Editor at Darkreading wrote an excellent article about GDPR. It is both reprimanding and encouraging to get off our collective butts and do something about GDPR very soon. If potential penalties of 20 million euros or 4% of your global annual revenue, whichever is higher, don't help us obtain better budgets, then we're doing something wrong. The article starts out with:

"The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.

‘Grey’s Anatomy’ Fall Finale Cliffhanger: Hospital Shut Down By Ransomware Attack

Ransomware goes prime time: TV Show Grey's Anatomy characters Bailey and Arizona are unable to access medical records on the computer and an I.T. specialist named Tim notes that cardiac monitors are malfunctioning.

Bailey asks for help fixing the problem as the hospital cannot run without access to medical records and the cardiac monitors. Suddenly hospital staff receive a message on their monitors from a hacker in this sneak peek from 'Grey's Anatomy' season 14, episode 8, 'Out of Nowhere.'

The future of cyberwar: ​Weaponised ransomware, IoT attacks and a new arms race

Steve Ranger at TechRepublic did a good job summarizing the direction of future threats we are going to have to deal with.

"After at least a dozen years in the shadows, cyberwarfare is gradually emerging into daylight. While cyber weapons were mostly developed and used by intelligence agencies as part of secret missions, they are now becoming an acknowledged military option during conflicts.

Here are predictions about how cyberwarfare will evolve over the next year. PS: You can download the Bad Rabbit in poster format at our resources section.

Ransomware recovery methods: What does the NIST suggest?

Knowing what ransomware recovery methods are available is important as the threat continues to grow. Expert Judith Myerson at TechTarget outlines what the NIST recommends for enterprises. She wrote:

"Since the WannaCry outbreak, ransomware has attracted a great deal of attention. In response, the National Institute of Standards and Technology, or NIST, published a draft version of ransomware recovery methods. What methods has the NIST recommended?

Antivirus Software Doing The Complete Opposite And Spreading Malware

Nicknamed AVGater by Austria-based security consultant Florian Bogner, he discovered an exploit within Antivirus software that takes advantage of the “restore from quarantine” function and allows a user to move a piece of malware from the quarantined folder to somewhere else on the victim’s computer, allowing the malware to be executed.

Skeleton in the closet: 17-year old MS office flaw allows malware install when user opens file

Here is a new pain in the neck! Fix this one ASAP.

While the world is still dealing with the threat of 'unpatched' Microsoft Office's built-in DDE feature, researchers have uncovered a serious issue with another Office component that could allow attackers to remotely install malware on targeted computers.

The vulnerability is a memory-corruption issue that resides in all versions of Microsoft Office released in the past 17 years, including Microsoft Office 365, and works against all versions of Windows operating system, including the latest Microsoft Windows 10 Creators Update.

Webinar “Six Cybersecurity Trends Organizations Need to Watch for in 2018”

Watch this insider’s perspective of cybersecurity trends to expect in 2018 from our founder Stu Sjouwerman. The list of six predictions are founded on KnowBe4’s deep insight into threats that organizations experience today and should expect tomorrow.

Subscribe To Our Blog

Phish Your Users

Recent Posts

Get the latest about social engineering

Subscribe to CyberheistNews