Monero (XMR) has become the target for hackers over the past few days. Recently, BCFocus reported about a vulnerability in the Monero wallet that allowed hackers to loot XMR from crypto exchanges. This time, it is said that over 200,000 routers have been hacked using a malware in Brazil to secretly mine Monero (XMR). The online hackers are said to have targeted a particular brand of routers, named MicroTik. Simon Kenin, a researcher from TrustWave, found out about the secretive attack and was the first to report it.
The US Department of Energy (DoE) is planning a “hands-on” test of the real-world consequences associated with successful cyberattacks against core country services. Cyberattacks levied against critical infrastructure, smart grids, and utilities are not a future possibility; but rather, they are happening now. Ukraine’s power grid blackout in 2016 was one of the first real indicators that if there are bugs which can be exploited, critical services are just as vulnerable as the average consumer or business to cyberthreats. The malware responsible for the attack in Ukraine — which caused the city of Kiev to lose power for an hour — has been dubbed Industroyer by ESET researchers.
This breakdown of Mitre’s model for cyberattacks and defense can help organizations understand the stages of attack events and, ultimately, build better security.
A new attack on Wi-Fi protected access protocols has been discovered. The new technique to crack WPA PSK (Pre-Shared Key) passwords enables outside users to capture access credentials easily.
Across industrial sectors, from healthcare to energy, from construction to retail, engineers are creating new technologies with potentially disruptive implications for the current architectural order of the global economy. One of the technologies, an “AI doctor”, shows great promise for the future of healthcare in Africa. The solution is called CareAi: an AI-powered computing system anchored on blockchain that can diagnose infectious diseases, such as malaria, typhoid fever, and tuberculosis, within seconds. The platform is engineered to serve the invisible demographic of migrants, ethnic minorities, and those unregistered within traditional healthcare systems. By bringing AI and blockchain together, CareAi uses an anonymous distributed healthcare architecture to deliver health services to patients anonymously. This makes it possible for these invisible cohorts to get access to basic healthcare, and useful contextual information without compromising their identities. Banks have proven that technologies like ATM and mobile money could help reduce staff headcounts, even while improving service quality and profitability. AI and blockchain promises the same to Africa’s healthcare at scale.
It’s early August, and we’re quickly approaching Hacker summer camp (AKA DEF CON). The Black Hat Briefings start August 8, DEF CON starts August 9, and many people will be closely following the latest security presentations at both conferences. But there’s another, exclusive conference happening at DEF CON that Amazon is excited to be a part of: we’re sponsoring R00tz Asylum. R00tz is a conference dedicated to teaching kids ages 8-18 how to become white-hat hackers.
Following the news that a hacking group based in Pakistan is attempting to carry out targeted malware attacks against nation states and individual citizens, IT security experts commented below.
It’s high summer here in North America, and for a lot of us, this one has been a scorcher. Media reports have been filled with coverage of heat wave after heat wave, with temperature records falling like dominoes.
A team of researchers at Duo Security has unearthed a sophisticated botnet operating on Twitter — and being used to spread a cryptocurrency scam.
Following the recent news regarding British shipping company, Clarksons, revealing that a data breach it suffered last year stemmed from a hack on a “single and isolated user account”, Joseph Carson, Chief Security Scientist at Thycotic offers the following comment.
Hardware vendor Hewlett Packard is sounding the alarm over two vulnerabilities in some of its popular printers, urging customers to update their HP equipment as soon as possible.
Suneel Gupta had his bags packed, ready to go to Washington. It was the night of Nov. 8, 2016, and Gupta, then a tech entrepreneur, was itching to leave the Bay Area and begin a new job in the Clinton White House.
According to KSN:
- Kaspersky Lab solutions blocked 962,947,023 attacks launched from online resources located in 187 countries across the globe.
- 351,913,075 unique URLs were recognized as malicious by Web Anti-Virus components.
- Attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 215,762 users.
- Ransomware attacks were registered on the computers of 158,921 unique users.
- Our File Anti-Virus logged 192,053,604 unique malicious and potentially unwanted objects.
- Kaspersky Lab products for mobile devices detected:
- 1,744,244 malicious installation packages
- 61,045 installation packages for mobile banking Trojans
- 14,119 installation packages for mobile ransomware Trojans.
In Q2 2018, Kaspersky Lab detected 1,744,244 malicious installation packages, which is 421,666 packages more than in the previous quarter.
Targeted attacks and malware campaigns
In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, senates, top state offices and officials, political science scholars, military and intelligence agencies, ministries, media outlets, research centers, election commissions, Olympic organizations, large trading companies and others.
The dark component of the deep web is the primary highway for the exchange and commerce among cybercriminal groups. In fact, very few cybercriminals work alone. Eighty percent of cybercrime is linked to criminal collectives, and stolen data-shaped goods surface rapidly on darknet forums and marketplaces following cybersecurity incidents with data loss.
AI and ML increasingly are being considered in security solutions as a real value-add
With the integration of a cloud storage support service platform designed to enable blockchain technology for digital information and data sharing, TSTT has added to the innovations available to its customers.