Cryptocurrency Hacks Still Growing — What Does That Mean for the Industry?

Posted on May 31st, 2019 by Responsible Cyber

Though once synonymous with underground networks and black hat hackers, bitcoin and other cryptocurrencies have gone mainstream over the past two years.In 2017, we saw the skyrocket of bitcoin to an all-time high of close to $20,000 followed by a significant decline the following year.But beyond the ups and downs in the market for the […]

Read More

Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones

Posted on May 31st, 2019 by Responsible Cyber

Whatsapp has recently patched a severe vulnerability that was being exploited by attackers to remotely install surveillance malware on a few “selected” smartphones by simply calling the targeted phone numbers over Whatsapp audio call.Discovered, weaponized and then sold by the Israeli company NSO Group that produces the most advanced mobile spyware on the planet, the […]

Read More

How to automate Let’s Encrypt certificate authority in AWS using PowerShell

Posted on May 31st, 2019 by Responsible Cyber

If you have been in IT for the last few years, no doubt you will have heard of Let’s Encrypt, an open certificate authority. Its goal is simple: Ensure the internet is no longer transmitted in plaintext. To that end it issues digital certificates for free. The service is completely automated in the right circumstances, […]

Read More

Federal cybersecurity agency on the way?

Posted on May 31st, 2019 by Responsible Cyber

The departments and agencies within the United States government have evolved over time to address modern-day problems and meet the changing needs of citizens. For example, the Department of Homeland Security was created in the aftermath of the September 11th attacks as a measure to improve domestic safety and handle threats of terrorism. Jumping forward […]

Read More

Review: FireMon clears the clutter for network security policy management

Posted on May 31st, 2019 by Responsible Cyber

It’s kind of a paradox that as an organization’s network grows, they have to add more and more security appliances and programs to keep it safe, yet with increased complexity comes diminishing returns on those investments. What happens is that new security platforms implement new rules, which often conflict with or duplicate existing protections. And […]

Read More

Act fast to recover assets after cyber fraud

Posted on May 31st, 2019 by Responsible Cyber

Targeted scams that cause organizations to redirect payments is resulting in billions of dollars in losses each year, and often recovery of those lost assets is very difficult. In April 2019, for example, a church in Ohio was scammed out of $1.75 million after it came to light that it had been paying construction fees […]

Read More

How to establish your business’s risk tolerance

Posted on May 31st, 2019 by Responsible Cyber

Every organization in operation today faces a barrage of risks – from cyberattacks aimed at stealing data to geopolitical threats that could disrupt operations. Yet security experts say executives at many organizations don’t know which specific risks pose the greatest threats to their business’s survival, which would wound them, and which could cause mere operational […]

Read More

Hackers Stole Customers’ Credit Cards from 103 Checkers and Rally’s Restaurants

Posted on May 31st, 2019 by Responsible Cyber

If you have swiped your payment card at the popular Checkers and Rally’s drive-through restaurant chains in past 2-3 years, you should immediately request your bank to block your card and notify it if you notice any suspicious transaction.Checkers, one of the largest drive-through restaurant chains in the United States, disclosed a massive long-running data […]

Read More

Germany Talking about Banning End-to-End Encryption

Posted on May 31st, 2019 by Responsible Cyber

Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, although the article doesn’t say how. (Cory Doctorow has previously explained why this would be impossible.) The article is […]

Read More

Hackers Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware

Posted on May 31st, 2019 by Responsible Cyber

Cyber Security researchers at Guardicore Labs today published a detailed report on a widespread cryptojacking campaign attacking Windows MS-SQL and PHPMyAdmin servers worldwide.Dubbed Nansh0u, the malicious campaign is reportedly being carried out by an APT-style Chinese hacking group who has already infected nearly 50,000 servers and are installing a sophisticated kernel-mode rootkit on compromised systems […]

Read More