

Erich Kron
Security Awareness Advocate /*=$expert->feature_status*/ ?>
KnowBe4
Comments Dotted :
49
February 19, 2021
DoppelPaymer not only cripples the organization's ability to conduct business but also extracts sensitive data.
This is an example of how disruptive ransomware can be, even for the largest organizations. Cybercriminals, such as those in the DoppelPaymer gang responsible for this attack, have honed their skills to create the most mayhem and disruption possible, in an effort to demand these incredibly high ransoms.
In this case, the attack has impacted many significant IT systems, including those needed for customers to take delivery of their newly-purchased vehicles. This could cost the organization a
.....Read More
December 14, 2020
Attackers love to have access to usernames and passwords that they will then use in credential stuffing attacks.
This is a great example of how technically advanced modern attackers are. While we often hear about data breaches and fraudulent wire transfers, campaigns like this quietly run in the background generating income by redirecting search results. In many cases, it’s likely that the advertisers are unaware that malware is being used to increase this traffic. The advertisers are losing money, as they are presenting ads to possibly uninterested people, while paying the cybercriminals.
The addition .....Read More

November 25, 2020
Tesla did a great job quickly fixing the issue with an over the air update.
This vulnerability helps to illustrate how our homes and vehicles have become more connected and as convenience features are added, the attack surface increases. In this case, while relatively low cost considering the value of a targeted Tesla, there are a number of steps that need to take place in order to pull it off. While not difficult, it could raise some suspicion if done in a public parking lot or other populated public space. Tesla did a great job quickly fixing the issue with an over.....Read More

November 20, 2020
Consumers should be aware that just because a lot of others are using the service, doesn’t mean that the service is secure or safe to use.
This is an example of the dangers of trusting third-party apps and a lesson in how not to respond to reported security issues. This vendor uses no authentication to ensure that only the intended recipients can receive the multimedia files. Instead, by using only a short, generated hex number to retrieve the file, they leave a huge number of people vulnerable to having private photos and data pilfered without their knowledge. More concerning is the thought that users may not even be aware of how .....Read More

October 14, 2020
It is unfortunate to see that so much of the data was removed without being noticed by the organisation.
Not only is this leak significant in the volume of data that was leaked, but also the sensitive contents of the data as well. This is not a simple matter of an email address and a name; when sensitive information such as passport numbers and license scans along with payroll information are lost, these can cause significant damage to the users of the service, up to and including real identity theft.
Between legal fees, fines and identity theft protection services being provided to the victims,.....Read More

August 19, 2020
Just because the data is not leaked to the public, it does not mean it will not be sold on the dark web.
This is just another example of how ransomware continues to wreak havoc on organizations of all size across most any industry. In this case, unfortunately the strain is one of the newer types that exfiltrates data prior to encrypting the files. In these cases, the data exfiltration is often worse than the file encryption component as encrypted files can be restored from a backup, but once the data is exfiltrated, it cannot be undone. This one-two punch of data exfiltration and denying access.....Read More

August 11, 2020
Like so many other scams that we see, this one also relies on the emotional element.
This is an unfortunate side effect of the enduring COVID-19 chaos mixed with the confusing and arduous processes related to U.S. immigration. By taking items or programs that people may have heard of or are mildly aware of and promising to help the individuals navigate the confusing process, the attackers make the scam look more credible and attractive to potential victims. The victims would not see anything unusual in the information being requested by the scammers, as this information makes.....Read More

August 07, 2020
it is important to log not only who has access, but when and what data they are accessing.
While this appears to be an issue related to a third party, it does underline the security concerns around intellectual property when working with business partners both up and down the supply chain. There is always a risk when sharing potentially sensitive information to these business partners, however, this is often an unavoidable part of doing business.
Intel appears to have quickly traced the source of the information and I have no doubt, will be taking steps to review access and logs as.....Read More

July 13, 2020
It is nice to see the government taking this seriously and making moves to address the issue.
This consolidation is good news, as so many financial crimes these days have a cyber element and cyber crime has a traditional element, such as the use of money mules to withdraw and muddy the money trail. By consolidating, there is far less bureaucracy and red tape to deal with when crimes cross both sides of the spectrum.
Given the sheer amount of money that the organizations within the U.S. are hemorrhaging every year due to financial and cyber crime, it is nice to see the government taking .....Read More

June 26, 2020
This breach has released the same information about hundreds of thousands of victims who also are now at risk.
While people generally focus on breaches that involve passwords, credit card numbers, or other financial details, breaches of this magnitude that compromise a significant amount of personal information cannot be ignored.
It is important to understand that not only was the information about the individual stolen, but other data such as Facebook friend lists and additional data that could even put others at risk. Given the volume of information lost here, it is important that the organisation.....Read More
