

Robert Ramsden Board
VP EMEA feature_status*/ ?>
Securonix
Comments Dotted :
28
June 04, 2020
The fact that this cybercriminal gang has set up a site to auction exfiltrated data.
REvil ransomware is the same strain that was used when the A-list law firm Grubman Shire Meiselas & Sacks was breached last month. The fact that this cybercriminal gang has set up a site to auction exfiltrated data just proves how valuable information in today’s digital society is. From personal information (in this instance Madonna and other celebrities) to corporate data, such as a US food distributor, information in all forms has significant resale value on the dark web. Unfortunately,.....Read More

June 01, 2020
This includes backup files! Even if the majority of the information is in the public domain.
Unfortunately it seems as though businesses are not learning their lessons, and yet again leaky AWS S3 bucket security is the cause of a data breach. Enterprises must remember that their security is only as strong as their weakest link, and time and time again we are seeing AWS S3 bucket security appearing as that weakest link. It is important to remember that AWS S3 buckets have varying levels of security and it is simply not good enough to trust default settings. When it comes to processing.....Read More

June 01, 2020
Cybercriminals are opportunists.
Cybercriminals are opportunists. They will leverage any given opportunity to use underhanded tricks to separate consumers from their hard-earned money or valuable personal information. When it comes to online shopping it can be even more dangerous because you surrender not only your personal information and payment details, but also your home address for delivery. This not only creates risk for identity theft, but also compromises the physical security of your home. We have seen a rise in.....Read More

May 29, 2020
Once the public has adequately protected themselves from “Wave 2” tactics, cybercriminals will certainly pivot their attack vectors.
In the last couple of weeks, we have observed a surge in the number of new domains registered that are themed around corona/COVID-19 stimulus or financial recovery, that are being used to maliciously target people. Of these targeted emails, we have seen three clear trends in COVID-19 related phishing attempts:
- Wave 1: Focused on coronavirus, the symptoms, and how to self-diagnose.
- Wave 2: Tailored towards the cure/vaccine, disease progress tracking, and tips to engage kids at home.
- Wave 3:

May 28, 2020
Despite LiveJournal’s efforts to encrypt personally identifiable information (PII), the MD5 hashed passwords were easily converted to plain text.
Yet again we are seeing private consumer information surfacing on hacking forums. This emphasises the importance of password security, both for businesses and individuals. This manifests on two separate, but crucial, levels. Despite LiveJournal’s efforts to encrypt personally identifiable information (PII), the MD5 hashed passwords were easily converted to plain text. This means that businesses that use and process any instance of PII should spare no expense when it comes to customer.....Read More

May 20, 2020
We will most likely see a series of phishing attacks targeting EasyJet customers in the near future.
Passengers have to trust that airlines are securing their Personal Identifiable Information when they book with them, but a breach of this magnitude breaks that trust. In many cases, we are still seeing misconfigurations/human errors commonly used by attackers to exploit victims with misuse of encryption often compounding the effects of human error in each type of breach. Allowing the information of about 9 million customers to be breached is a huge error, especially considering that the credit .....Read More

May 15, 2020
Cybercriminals are using virus-themed terminology to mislead users into downloading malicious material.
As more people are abiding by lockdown and working from home, we are seeing cybercriminals leveraging fear to seduce users into clicking malicious links. In fact, our COVID-19 Cyber Threat Update revealed that the number of malicious domains using the words “corona” or “covid19” have increased exponentially. Therefore, it is no surprise that cybercriminals are exploiting the NHS COVID-19 application, due to the increase of pandemic-themed social engineering techniques. Indeed, if you.....Read More

May 13, 2020
We are again seeing the detrimental impact that ransomware can have on the healthcare industry.
We are again seeing the detrimental impact that ransomware can have on the healthcare industry. Hospitals and healthcare providers are amongst the most frequently targeted organisations because of the highly valuable information that they process. For example, the personal health information (PHI) of military and government agencies, labour unions and employers will certainly fetch a pretty penny on the dark market. This means that the agencies that are most at risk of data exfiltration should.....Read More

May 12, 2020
This just proves that no one is immune to cyberattack, and you never know where the next target will be.
Unfortunately we are again seeing the results of a data breach ending up on the dark web. While there isn’t much that can be done about having your PII breached, users should look to observe World Password Day a few days late and change their passwords immediately. This is especially true if users have the same, or similar passwords across multiple accounts. While the passwords were encrypted, this does not mean that they are indecipherable and there is a chance that hackers can obtain.....Read More

May 08, 2020
This challenge becomes even more complicated when considering cloned sites of trusted vendors such as Cisco Webex.
Our research has seen a rise in convincing phishing attacks targeting people working from home. Cybercriminals are increasingly using typo-squat variants of domains relating to COVID-19 as organisations have not been able to proactively monitor or block these harmful social engineering techniques for fear of not communicating vital and valid information about the pandemic. This challenge becomes even more complicated when considering cloned sites of trusted vendors such as Cisco Webex. We.....Read More
