Blog

Blog

Hackers Breach Kmart's Store Payment Card Systems

Kmart is informing customers that their credit card details may have been stolen after learning of a security breach involving its payment processing systems. Sears Holdings, Kmart’s parent company, confirmed the incident on Wednesday, but did not disclose any information regarding the number of stores affected or when the incident occurred. The...
Blog

Customer Data Reportedly Compromised in OneLogin Security Incident

Identity and access management software vendor OneLogin has suffered a security incident that reportedly compromised customer data. On 31 May, the provider of identity-driven security solutions revealed that an unauthorized party had gained access to OneLogin data in the U.S. region. Alvaro Hoyos, chief information security officer at OneLogin,...
Blog

Hackers Leak Personal Data and Photos from Cosmetic Surgery Clinic

A group of hackers have leaked personal data and photos that belong to patients of a cosmetic surgery clinic based in Lithuania. On 30 May, the bad actors published online some 25,000 private photos, including nude images, from patients of the Grozio Chirurgija clinic. They also included personal information in their dump. Those details ranged from...
Blog

Law Firm Loses £110K to BEC Scam as Fraudster Gets the Slammer

A law firm lost more than £100,000 to a business email compromise (BEC) scam around the same time that a serial fraudster received a prison sentence. The law firm in question helped orchestrate the sale of property owned by three individuals, who asked to receive their share of the sales money separately. On the date of sale, two of the entities...
Blog

How to Get Away with Hacking the Department of Homeland Security

Many businesses live in fear of having their systems hacked. After all, who wants their customers' data to spill out onto the internet or have their confidential plans and intellectual property stolen by online criminals? But more and more organizations like Google, Facebook, and Amazon are actually welcoming attempts to test their security in the...
Blog

Women in Information Security: Sarah Aoun

Women are doing very important work in the cybersecurity field, and I've really been enjoying talking to some of the brightest and most interesting minds in my field. In my last interview, I spoke to Kelly Shortridge. She went from a career in high finance to a security-related product manager role for BAE. This time, I get to talk to Sarah Aoun....
Blog

Top 10 Mobile Security Tips for Your Summer Vacation

With the summer holiday and festival season getting into full swing, you’ll want to stay connected to convenient travel and social media apps more than ever. But it’s important to be hyper-aware that cyber thieves are on the prowl for your personal, financial and location information. When traveling, like many of us will be doing this Memorial Day,...
Blog

Five Australian Hospitals Suffer IT Outages after Patching for Ransomware

Five hospitals in the Australian state of Queensland have suffered IT outages after a botched attempt to patch their systems against ransomware. On 25 May, Queensland Health Minister Cameron Dick provided some details to The Courier-Mail about the failures: "Over the course of that weekend as part of protecting our systems from cyber-attack, a...
Blog

Tripwire Tuesdays: Avoiding IT Crisis Fatigue

Tripwire Enterprise can gather any number of different kinds of information from a monitored system, such as file and folder changes, registry changes, policy changes, etc. However, cast the net too wide and you can potentially end up with more information coming in than you can react to. This will lead to important changes (the signal) being lost...
Blog

Newly Designed Jaff Ransomware Now Encrypts Data with WLU Extension

An updated variant of Jaff ransomware boasts a more professional design and now encrypts victims' data with the WLU extension. On 23 May, Internet Storm Center (ISC) handler Brad Duncan collected 20 malspam emails that all used a fake invoice theme and a spoofed email address. The emails also came with a PDF attachment containing an embedded Word...
Blog

Today’s Cybersecurity Challenges Started in 1648

Understandably, a few eyebrows raise up when I suggest today’s cybersecurity challenges started nearly 370 years ago, some 300 years before the invention of ENIAC (the world’s first digital computer). But I stand by this observation because of the unintended clash of two systems: the nation-state and the Internet. Many of the institutions, social...
Blog

Russia Announces Arrest of 20 "Cron" Malware Group Members

The Russian Interior Ministry has announced the arrest of 20 individuals who helped develop and perpetrate a mobile malware campaign known as "Cron." On 22 May, Russian Interior Ministry representative Rina Wolf disclosed a joint effort with Russian IT security firm Group-IB designed to bring down the malware group. The collaboration culminated in a...
Blog

Women in Information Security: Kelly Shortridge

Cybersecurity isn't just for guys! It's crucial to highlight the important work that women and non-males are doing in the information security field. Previously I spoke with Thais, a Brazillian woman in Germany who's doing some intriguing malware research. This time, I've had the honor of speaking to Kelly Shortridge. She went from high finance to...
Blog

The Future of Net Neutrality

According to the Oxford Dictionary, net neutrality is "the principle that internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites." Simply put, net neutrality ensures that service providers don't give preferential treatment to websites...