Top news of the week: 27.03.2020.

#Infosec #COVID19 #medical #CTI #data #alertfatigue #falsepositives #cybersecurity #malware #coronavirus

Threats And Attacks

On Mar 22, 2020
@teamcymru shared
All hands on deck: #Infosec volunteers to protect #medical organizations during #COVID19 crisis https://t.co/Ick6sckV25 https://t.co/51qsoBd4Mw
Open

All hands on deck: Infosec volunteers to protect medical organizations during COVID-19 crisis

All hands on deck: Infosec volunteers to protect medical organizations during COVID-19 crisis

Hackers crossed a line last week when they struck the computer network of the Czech Republic’s second largest hospital as it was testing people for the novel coronavirus. Former White House ...

On Mar 26, 2020
@dimitribest shared
RT @spontiroli: Hackers Hijack Routers’ DNS to Spread Malicious COVID-19 Apps https://t.co/AdRPuwH9C0
Open

Hackers Hijack Routers’ DNS to Spread Malicious COVID-19 Apps

Hackers Hijack Routers’ DNS to Spread Malicious COVID-19 Apps

A new cyber attack is hijacking router's DNS settings so that web browsers display alerts for a fake COVID-19 information app from the World Health Organization that is the Vidar ...

On Mar 21, 2020
@EduardKovacs shared
A database containing over 5 billion records of data leaked in previous data breaches was exposed by a UK-based cybersecurity company. https://t.co/Vadkd6TDYi
Open

Unprotected Database Exposed 5 Billion Previously Leaked Records

Unprotected Database Exposed 5 Billion Previously Leaked Records

A database containing over 5 billion records of data leaked in previous data breaches was exposed by a UK-based cybersecurity company

On Mar 25, 2020
@teamcymru shared
Increasing number of false positives causing risk of alert fatigue #infosec https://t.co/SjBqUcLyWB https://t.co/oZLqYuFDaL
Open

Increasing number of false positives causing risk of alert fatigue

Increasing number of false positives causing risk of alert fatigue

Security tools that produce large quantities of data, without contextualizing threats, are contributing to data overload, alert fatigue and burnout.

On Mar 23, 2020
@Treadstone71LLC shared
Autonomous Cyber AI for defence from AI-enabled cyber crime and AI enabled cyber Warfare by adversaries - IDST - International Defence, Security and Technology https://t.co/itDWe4zEe6
Open

Autonomous Cyber AI for defence from AI-enabled cyber crime and AI enabled cyber Warfare by adversaries

Autonomous Cyber AI for defence from AI-enabled cyber crime and AI enabled cyber Warfare by adversaries

Artificial intelligence and machine learning capabilities are growing  an unprecedented rate. These

On Mar 20, 2020
@Treadstone71LLC shared
RT @ChuckDBrooks: The Biggest Cybersecurity Threats to Enterprises in 2020 | BizTech Magazine https://t.co/AEQD4v0nPM
Open

The Biggest Cybersecurity Threats to Enterprises in 2020

The Biggest Cybersecurity Threats to Enterprises in 2020

Businesses are facing unique threats both externally and internally, and modern cybersecurity must meet the challenge.

On Mar 26, 2020
@threatpost shared
Cybercriminals are hijacking routers' DNS settings and redirecting victims to attacker controlled sites. These sites promote fake #coronavirus information apps that download #malware. https://t.co/ljN69q79ft
Open

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

The router DNS hijacking attacks have targeted more than a thousand victims with the Oski info-stealing malware.

On Mar 26, 2020
@paulsparrows shared
RT @InfosecurityMag: Cloud Native Threats: The Role of Infrastructure https://t.co/s0KirtBDYH
Open

Cloud Native Threats: The Role of Infrastructure

Cloud Native Threats: The Role of Infrastructure

What if cyber-criminals could find a way to simplify the setup of their malicious infrastructures, using an available and resilient architecture?