Security News > 2020 > June

Verizon's annual Data Breach Investigations Report confirmed 3,950 data breaches across 16 industries. Tom Merritt explains five things to know about these breaches.

Verizon's annual Data Breach Investigations Report confirmed 3,950 data breaches across 16 industries. Tom Merritt explains five things to know about these breaches.

Finally, after years of states' use of this kind of powerful spyware against their rivals and political enemies, the US Congress is planning to order its Director of National Intelligence to keep track of the threat this malware poses to the nation, which foreign governments are using it, and for what. The Senate bill - which lays out funding for the government's intelligence operations for next year - would require the DNI to submit a report to Congress on the threat posed by commercial spyware.

A Magecart credit-card skimmer was used to attack online customers of the retailer Claire's for a month and a half, according to researchers. "Following common Magecart malpractice, payment skimmers were injected and used to steal customer data and cards," according to Sansec.

The hack stems simply from a lightbulb hanging in the home. In November, researchers discovered a new way to hack Alexa and Siri by pointing a laser light beam at the smart speakers' microphones to send them remote, inaudible commands.

What we noticed on the dark net was almost immediately a series of schemes and fraud schemes perpetrated toward the banks, the small business administration, and the other agencies that were affected by the stimulus money. What they're using as seed data for these particular loan applications is stolen private information, PII data, of individuals on the dark net.

Kurtis Minder, co-founder and CEO of GroupSense, explains why the coronavirus has been big business for bad actors.

Mark Andrews of St Helens, northwest England, was sentenced to prison by Liverpool Crown Court after pleading guilty to one charge of theft and one charge under the Computer Misuse Act. By day 38-year-old Andrews was a self-employed IT support specialist, and a business enquiry in April 2019 led to him spotting a folder on a new customer's network containing Bitcoin, Litecoin and Ethereum.

Intel on Monday unveiled a new security technology for its processors that will help protect systems against attack methods commonly used by malware. Intel CET has two main components: indirect branch tracking, which should provide protection against jump oriented programming and call oriented programming attacks; and shadow stack, which provides return address protection against return-oriented programming attacks.

Microsoft just found a campaign that exploits Kubernetes to install cryptomining software in its Azure cloud. Kubernetes is an open source project that lets administrators manage software containers en masse, and it runs in cloud infrastructures like Microsoft's Azure.