Thursday, June 20, 2019

Stolen NSA Tool May Be Responsible for Rash of Ransomware Attacks

Stolen NSA Tool May Be Responsible for Rash of Ransomware Attacks 

Ransomware attacks on local governments have become alarmingly prevalent, and they may have an unlikely source – a cyber weapon developed by the U.S. National Security Agency (NSA). In 2017, the NSA lost control of one of its most impactful weapons, code-named EternalBlue, and it now lies in the hands of independent bad actors and state sponsored hackers. 

The impact on local governments has been immense. While some cities refuse to pay the ransom, many are left with little choice but to pay up to restore access to their digital infrastructure. At the same time, the additional security costs have made it difficult for cash-strapped governments to combat the threat. 

With so much on the line, a comprehensive ransomware response plan has never been more important. Since most ransomware originates as phishing scams sent to employee email accounts, this also means that proper training can be worth its weight in gold, or at least in Bitcoin. 



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Monday, June 17, 2019

Quick Tips for preventing Cyber theft




Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Friday, June 14, 2019

Canada Sees Spike in Malicious Email Campaigns

Canada Sees Spike in Malicious Email Campaigns 

Canadians were the target of more than 100 campaigns in the first four months of 2019. The malicious email campaigns were especially geo-targeted to French-speaking regions of the country, which include important organizations for the shipping, logistics, banking, and governments services. 

While a few specific campaigns accounted for much of the traffic, phishing emails and imposter attacks are on the rise globally, making many companies’ own employees the primary culprit in enabling more extensive data breaches to occur. 

Consequently, organizations have a responsibility to train their employees about the emerging trends, growing risks, and best practices to ensure that their networks remain secure. You might even want to partner with an MSP that can facilitate these initiatives, ensuring that your most prescient vulnerabilities become a trained level of defense against cybercrime
.

https://www.scmagazine.com/home/security-news/malware/great-white-north-bombarded-with-malicious-email-campaigns-report/

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Wednesday, June 12, 2019

Mobile Banking Malware Increases by 58%

Mobile Banking Malware Increases by 58% 

According to a recent report by Kaspersky Lab, mobile banking malware is on the rise. The first quarter saw instances of mobile banking malware more than triple, and there was a 58% increase in modifications to banking trojans. 

A single piece of malware, dubbed Asacub malware, accounts for more than half of the banking trojans detected during this time, attacking approximately 8,200 users a day. 

In the first three months of the year, cybersecurity researchers identified 29,841 different modifications of banking trojans, underscoring the complex tasks that companies have when defending their digital infrastructure. 

As more and more financial services are conducted online, it’s a troubling sign to see an uptick in the scope and complexity of mobile-focused malware attempts. It’s also a reminder that companies can’t win this battle alone. They need to partner with skilled MSPs to help them identify and eliminate the latest threats to their businesses.



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Friday, June 7, 2019

Australia Sees a Spike in Credential Stuffing Attacks

Australia Sees a Spike in Credential Stuffing Attacks 
If you’ve ever wondered what happens to the deluge of data stolen during a cybersecurity breach, Australia’s sudden spike in credential stuffing attacks will certainly provide some clarity. 

According to a recent cybersecurity report, Australians are now the fifth highest target for credential stuffing attacks, an incredible metric given their modest population. 

This form of cybercrime involves hackers using previously stolen information like usernames, email addresses, or passwords in an attempt to gain access on other platforms. Since people often use the same username and password combinations, it’s often possible to apply stolen credentials across multiple accounts. 

The report found a robust market for stolen credentials that are often sold in bulk on the Dark Web. Businesses are encouraged to deploy the latest security standards, like two-factor authentication, to help prevent these attacks. Moreover, it underscores the cascading consequences of a data breach, and it highlights the importance of keeping a pulse on customer and employee information. Hint: that’s our bread and butter. Ask your MSP how you can partner with ID Agent and engage Dark Web monitoring services like ours.



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Wednesday, June 5, 2019

In other news

In Other News:

65,000 Data Breaches Reported Under GDPR 

From the onset, it was clear that Europe’s expansive privacy law, the GDPR, would have drastic effects on the way companies approach data security and customer privacy. Now, the first report by the European Data Protection Board, an independent oversight committee established as part of GDPR, helps us understand the overall impact thus far.

According to its first annual report, European authorities have received almost 65,000 data breach notifications in the first nine months that the law was in effect. 

Even worse, these data breaches each came with a hefty price tag. Regulations imposed $63 million in regulatory fines, demonstrating the importance of cybersecurity not just as a PR priority, but also as a matter of fiscal responsibility. 

The result, according to UK intelligence authorities, is that companies are taking unprecedented measures to protect their digital infrastructure, and they are crafting response plans to ensure that they prepared to address a data breach if it occurs. In summary, the future of cybersecurity will require an evolution in what is expected of businesses when it comes to protecting customer and employee data, along with continuous advancement in the capabilities of security providers
.

https://www.databreachtoday.com/gdpr-europe-counts-65000-data-breach-notifications-so-far-a-12489 

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com