Cybersecurity

2307, 2021

Printer Vulnerability CVE-2021-3438, China Attacks Microsoft, Pulse Secure VPN Cyberattack, Pegasus Spyware Compromised, Kaseya Ransomware Decryption Key

July 23rd, 2021|

1.  A 16-year-old Printer Vulnerability CVE-2021-3438 (CVSS score: 8.8) Impacts Millions of Infrastructures A 16-year-old vulnerability was discovered in popular corporate printers that allow hackers to gain administrative rights to perform several activities on systems, including the ability to install rogue programs, view, change, encrypt or wipe data. This critical vulnerability is prevalent in HP, Samsung, and Xerox printer software, impacting ...

907, 2021

The Kaseya Ransomware Attack SME Breakdown, DOD Data Left Unprotected, Morgan Stanley Data Breach & Email Exploitation

July 9th, 2021|

1.  Kaseya Ransomware Attackers Demand A $70 Million Ransom An affiliate of the notorious REvil ransomware gang compromised Kaseya’s virtual systems administrator (VSA) software. The Russian-linked attackers compromised the backend architecture of the IT infrastructure management tool. They used its notification capability to send a malicious update to VSA servers running on client environments. Thus, installing a ransomware code onto ...

3006, 2021

4 Reasons Why Ransomware Works

June 30th, 2021|

Putting everything else aside, there’s one thing you can’t deny about ransomware: It’s good business. After all, what would most businesses do for a 56% conversion rate? How about 56% on a $300,000 product? Ransomware, at least in the modern sense, is only about seven years old. Yet it’s already a multi-billion-dollar problem, for everyone other than the attackers themselves. ...

1806, 2021

Double Ransomware Attacks, Carnival Cruise’s Data Breach, REvil Compromises U.S. Nuclear Weapons Contractor, CVS Gets Hacked, G7 Cracks Down On Russia

June 18th, 2021|

1.  After Paying Off The First Ransomware Demand, Most Firms Face A Second Ransomware Attack Security experts discovered that ransomware attackers deploy secondary ransomware attacks against firms that pay off initial ransom demands. After paying off a ransom demand, firms often receive a decryptor for their hijacked systems. However, most attackers corrupt hijacked systems by creating backdoors that allow future ...

1406, 2021

Chinese Threat Actors Target NY MTA, Surge in Brokerage Account Hacks, Fake Encrypted Chat Platform Anom Lures Criminals, Ransomware Attacks Prioritized as Terrorism

June 14th, 2021|

1.  Chinese Threat Actors Target New York’s MTA Chinese-sponsored threat actors leveraged Pulse Secure vulnerabilities to compromise systems belonging to the New York Metropolitan Transportation Authority (MTA). It is unclear why state-sponsored actors targeted the MTA. Still, security experts investigating the case speculate that China may be trying to obtain sensitive information on U.S. transit networks to gain an advantage ...

306, 2021

3 Emerging Technologies For Achieving Zero Trust

June 3rd, 2021|

(Zero) Trust What effect does trust have in cybersecurity? To understand, we might consider what happened in late March, 1999, when millions of people received emails from their friends, family and coworkers. In each case, the format was the same. Title: “Important Message from [Name of Sender].” Message: “Here is that document you asked for...don't show anyone else ;-)” ...

204, 2021

Hackers Target EDR Tools, Nuke Account Spouts Gibberish, Ransomware Labelled National Security Threat

April 2nd, 2021|

Threat actors find ways against common endpoint security tools, US government classifies ransomware as a national security threat, an unattended government agency Twitter account that is responsible for US nuclear arsenal tweeted gibberish, a deluge of tools is actually making it harder for IT teams to assess their network's security and PHP’S ‘Git’ server compromised to add Backdoors to PHP source codes.

1903, 2021

US Gov. Using Outdated Android OS, Ransomware Demands Increase, Malware Detection Falls Short, Microsoft Teams and Sharepoint Bug, Pictures Steal CC Data | aiden IT Security News

March 19th, 2021|

1.  99.2% of U.S. Government Android Users Are Using Outdated OS Versions Out of the 200 million+ mobile devices being used by local, state, and federal government employees, a majority of said devices run on Android operating systems (OS). Shockingly, only 0.08% of those devices are operating on the newest version of said OS, which exposes those critical devices to ...

1203, 2021

Cyber Threat Act, Infamous Financial Hackers Return, EBA Targeted in Exchange Hack | aiden IT Security News

March 12th, 2021|

Proposed US Cyber Threat Act would allow Americans to sue foreign states for damages stemming from cyberattacks, infamous financial hackers FIN8 return with new tools , European Banking Authority targeted in Microsoft Exchange hack, Tesla and several other companies have security cameras hacked and suspected state-sponsored threats from China target Linux systems with new malware.

503, 2021

Federal Patch Order for Microsoft Exchange, Investment Firms Newly Scammed, Ryuk Ransomware Spreads Laterally – Cybersecurity News

March 5th, 2021|

US Dept. of Homeland Security issues patch order to any federal agencies using Microsoft Exchange, fake "capital call" emails target investors and investment firms, Ryuk ransomware adapts to move laterally through Windows LAN devices, Mobile adware campaigns targeting online banking and crypto-currency wallets sees expansive growth and threat actors game Google's SEO to prioritize payload distribution from fake sites.

2602, 2021

Unpatched Jail Software Forgets to Release Prisoners, Sequoia Venture Capital Hacked, Ransomware Strikes Aerospace Vendor – IT Security News and Trends

February 26th, 2021|

Major venture capital firm Sequoia fell victim to a targeted phishing campaign. Non-violent prisoners were kept after their scheduled release dates in Arizona due to a bug in custom software that failed to update prisoner records accurately. CLOP ransomware gang struck Bombardier, shadow attacks dupe PDF anti-tampering security and NGINX misconfigurations lead to website attacks.

1401, 2021

JetBrains Breach, US Formally Blames Russia for SolarWinds Hack; Babuk Ransomware – Cybersecurity News and Trends

January 14th, 2021|

A Widely Used Software Company, An Entry Point For Huge U.S. Government Compromise State intelligence agencies disclosed that a popular software company (JetBrains), based in the Czech Republic and founded by three Russian engineers, is likely the entry point that Russian-sponsored threat actors used to insert back doors into numerous large technology companies and major U.S. government systems. SolarWinds, one ...

1201, 2021

The 5 big wins every new CISO needs in the first 90 days

January 12th, 2021|

As of 2020, the average cost of a successful cyber breach is $3.9m – 12% up from last year. It’s not surprising that companies have high expectations when they hire a CISO. COVID-19 has introduced unique security challenges for the incoming CISO. Working from home has accelerated endpoint security risks. Many organizations face expanded cybersecurity attack surfaces due to bring-your-own-computer ...

801, 2021

SolarWinds State-Sponsored Supply Chain Attack vs. Standard Supply Chain Attacks

January 8th, 2021|

Supply chain attacks became a threat actor’s goldmine in 2020. With its low barrier to entry and effectiveness, different levels of threat actors continue to leverage supply chain attacks as a viable method to facilitate far-reaching nefarious activities, including espionage, sabotage, intellectual property theft, etc.  Although the average supply chain attack is perpetrated by a cybercriminal with purely financial interests, ...

3112, 2020

Cybersecurity in 2020: Year End Review

December 31st, 2020|

The year 2020 definitely made its way into everyone’s ‘naughty list’ for different reasons. Of course, COVID-19 was the chief reason, but we shall highlight more reasons in this article. The world faced an overwhelming number of cyber threats in 2020: ransomware attacks increased by 715%; business email compromises (BECs) and phishing exploits were more sophisticated than ever before; third party and state-sponsored supply chain attacks shook ...

1812, 2020

Our Response to the SolarWinds Hack – A Global Cyber Pledge

December 18th, 2020|

Why should I take the #globalcyberpledge? How we're solving cybersecurity by individuals coming together and getting educated? What is the need for continuous improvement? Our privacy and freedom are under attack by foreign, state-sponsored bad actors and we’re standing by letting it happen. Why? Because the answers are right in front of us yet we remain complacent. Back in ...

1712, 2020

How Financial Organizations Can Recover From and Prepare for a Ransomware Attack

December 17th, 2020|

The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19 exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic. It's likely that your financial institution is already taking the threat of a ransomware attack seriously. But does your firm have a ...

1612, 2020

Was the SolarWinds Hack Preventable?

December 16th, 2020|

The scope of the SolarWinds hack continues to expand as SolarWinds has updated their security advisory to show that more versions of the company’s Orion server software were impacted by the vulnerability than was previously thought. Furthermore, the Department of Homeland Security issued an emergency directive about the endpoint security breach telling federal agencies to shut down their servers until further notice. SolarWinds provides network administration, monitoring, and ...

Categories

Get aiden right in your inbox

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Get Updates Right In Your Inbox

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Go to Top