Tag: Information Security Buzz

Social Captain Instagram Account Exposed And Experts Reactions

Social Captain, the social media boosting service, which bills itself as a service to increase user’s Instagram followers, has exposed thousands of Instagram account passwords after storing them in unencrypted plain text. Social Media Startup Social Captain Exposed Thousands of Instagram Account Passwords Stored in Plaintext,…

Comment: WordPress Plugin Bug Exposes 200K+ Sites

A high severity cross-site request forgery (CSRF) bug allows attackers to take over WordPress sites running an unpatched version of the Code Snippets plugin because of missing referer checks on the import menu. According to the active installations count on…

Experts On Snake Ransomware

Following the news that a new piece of file-encrypting ransomware, which some are linking to Iran, has been targeting processes and files associated with industrial control systems (ICS), please see below for a comment from experts. The ISBuzz Post: This Post Experts…

LabCorp Exposes Thousands Of Medical Documents – Commentary

A vulnerability in LabCorp’s website that hosts the company’s internal customer relationship management system, exposed thousands (at least 10,000) of medical documents that contained names, dates of birth, Social Security numbers of patients, lab test results and diagnostic data. While…

Five Cyber Security Resolutions For 2020

New Year’s resolutions are notoriously hard to keep. In fact, according to this YouGov poll, most Brits failed to keep all the resolutions they made for 2019. It may be hard to believe but we’re now firmly into 2020. In…

Government Plans New Laws For Smart Gadgets

According to BBC News, the UK government is developing laws that would require manufacturers to ensure their smart gadgets cannot be hacked and exploited via the internet. This is in the face of concerns that many internet-enabled devices lack basic security…

With 5G And IoT, It’s A New Day With New Risks

Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of Things (IoT) has already become commonplace in our lives, thanks to all the connected devices and smart technologies we own,…

What Experts Say On New UK IoT Legislation

All Internet of Things and consumer smart devices will need to adhere to specific security requirements, under new government proposals. The aim of the legislation is to help protect UK citizen and businesses from the threats posed by cyber criminals increasingly targeting Internet…

Response Comment: Google Docs Down

A spike in fraudulent transactions has forced the Google Security team to suspend all publishing and uploading of paid Chrome extensions to the Chrome Web store. Paid extensions on the Chrome Web Store are being suspended due to an increase in fraudulent transactionshttps://t.co/nIrWLwXnYH — Android…

Severe Vulnerabilities Discovered In GE Medical Devices

It has been reported that the US Cybersecurity and Infrastructure Agency (CISA) today issued an advisory for six high-severity security vulnerabilities in patient monitoring devices. These flaws could allow an attacker to make changes at the software level of a device and in…

U.S. Govt Agency Hit With New CARROTBALL Malware Dropper

A new malware called CARROTBALL, used as a second-stage payload in targeted attacks, was distributed in phishing email attachments delivered to a U.S. government agency and non-US foreign nationals professionally affiliated with current activities in North Korea. CARROTBALL came in…

NETGEAR TLS Certs Exposure – Expert Source

NETGEAR recently issued a security advisory about a Transport Layer Security (TLS) certificate private key disclosure vulnerability on several of its routers. And this is apparently not the first time the company left TLS certificates and private keys exposed in their wireless…

TrickBot Steals AD Credentials – Expert Comments

Active Directory expert Gerrit Lansing, field CTO at STEALTHbits Technologies, addressed this week’s discovery of a new module for the TrickBot trojan that targets the Active Directory database stored on compromised Windows domain controllers. The ISBuzz Post: This Post TrickBot Steals AD…

Cybersecurity Experts Weigh In On Jan. 28 Data Privacy Day

This coming Tuesday, January 28, marks International Data Privacy Day.  Powered by the National Cyber Security Alliance, Data Privacy Day “encourages consumers to own their privacy and businesses to improve their data privacy practices.” The ISBuzz Post: This Post Cybersecurity Experts…

BitPyLock Ransomware Now Threatens To Publish Stolen Data

As reported by Bleeping Computer, a new ransomware called BitPyLock has quickly gone from targeting individual workstations to trying to compromise networks and stealing files before encrypting devices. BitPyLock was first discovered by MalwareHunterTeam on January 9th, 2020 and has since seen a…

Comments On The Hanna Anderson Magecart Attack

Hanna Anderson, a company that offers children’s clothes online, has been the target of a Magecart attack wherein their customers’ credit card information was stolen as they were making purchases. The attack was discovered after the credit cards were found for sale…

CEO Comments On FBI Warnings On Election Infrastructure

In a change of policy, state elections officials will be notified by the FBI of possible cyber threats to election infrastructure.  Homeland Security has also provided election officials with best practices for securing election systems. The ISBuzz Post: This Post CEO Comments On…

Return Of Emotet In New 2020 Campaign – Expert On Research

Researchers at cybersecurity firm Proofpoint have observed that the prolific botnet Emotet has returned to the email threat landscape after a hiatus at the end of 2019. The Trojan-turned-botnet is being distributed by threat group TA542, using attachments and malicious links containing…

Security Expert On P&N Bank Breach

P&N Bank’s data breach has exposed personally identifiable information (PII) and account data of 100,000 customers. The breach was likely caused by a third party that was providing hosting services when P&N was performing a server upgrade. Security experts commented…

Thousands Of British Passports Left Exposed On Unsecured AWS Bucket

It has been reported that an unsecured database on Amazon has been discovered, exposing sensitive information and passport scans on thousands of employees. The information, including thousands of passport scans, tax documents, background checks, job applications, expense forms, scanned contracts,…

Russians Hack Ukrainian Gas Company – Experts Comments

Russian military hackers have been boring into the Ukrainian gas company, Burisma, at the centre of the Trump impeachment affair, according to security experts. The hacking attempts against Burisma, on whose board Hunter Biden (Joe Biden’s son) served, began in early…

Comments: Dating Apps Leak Personal Data

Dating apps including Grindr, OkCupid and Tinder leak personal information to advertising tech companies in possible violation of European data privacy laws, a Norwegian consumer group said in a report Tuesday.  The Norwegian Consumer Council said it found “serious privacy infringements” in…

Expert On News: Trump Attacks Apple Over Access To Data

US President Donald Trump has attacked Apple over their refusal to unlock iPhones “used by killers, drug dealers and other violent criminal elements”.  On Monday US Attorney General William Barr accused Apple of not being helpful in an inquiry into a shooting that…

Over 1 Billion Medical Records Exposed Online – Experts Comments

TechCrunch broke news of research last Friday that A billion medical images are exposed online, as doctors ignore warnings.  Discovered by German cybersecurity firm Greenbone Networks, the exposure follows a similar report from the company in September that detailed 24 million medical records…

SHA-1 Attacks On Upswing – Expert Comments

According to new research, attacks on the SHA-1 hashing algorithm just got a lot more dangerous with the discovery of a cheaper, more practical version of SHA-1 collision attacks. Hashing algorithms are used to compute the keys used in public key…

Enhanced Crypto-currency Hacks Target Businesses Across The Globe

A North Korea-backed hacking campaign that targets both Windows and macOS systems has been updated with new techniques and tools, it has been reported. This campaign, dubbed ‘Operation AppleJeus’, is designed steal cryptocurrency from organisations and individuals around the world. Attacks…

Experts On 50K Exposed In Minnesota Hospital Breach

The personal and medical information of 49,351 patients was exposed following a security incident involving two employees’ email accounts as disclosed by Minnesota-based Alomere Health. The Alexandria, Minnesota-based locally-governed hospital started notifying its patients of the security breach incident on January 3,…

Check Point Research Reveals Multiple Vulnerabilities In TikTok

Personal information such as private addresses and email addresses were vulnerable to exposure in one the world’s most trending apps  Check Point Research revealed today that it uncovered multiple vulnerabilities in TikTok which could have allowed attackers to manipulate content…