Page 5 - Threat Intelligence 8-16-2019
P. 5

Security News












        North Korea took $2 billion in cyberattacks to fund weapons program: U.N. report - UNITED NATIONS
        (Reuters) - North Korea has generated an estimated $2 billion for its weapons of mass destruction programs
        using "widespread and increasingly sophisticated" cyberattacks to steal from banks and cryptocurrency
        exchanges, according to a confidential U.N. report seen by Reuters on Monday. The experts said North Korea
        "used cyberspace to launch increasingly sophisticated attacks to steal funds from financial institutions and
        cryptocurrency exchanges to generate income." They also used cyberspace to launder the stolen money, the
        report said.
                Source: https://news.yahoo.com/north-korea-took-2-billion-182814127.html




        Research shows that devices banned by US government lack basic security practices - As the August 13
        deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue.
        The panic about banned cameras still being in operation shines a spotlight on both the severity of the issue
        and the dire need to find a solution.

                Source: https://www.helpnetsecurity.com/2019/08/02/devices-banned-by-us-government/



        Warshipping: Attackers can access corporate networks through the mailroom - The expression has been
        coined by IBM X-Force Red researchers to describe a new attack vector, which consists of covertly delivering to
        the target’s premises small devices that can be used to gain access to the home or office wireless network and
        assets connected to it. A warshipping attack takes advantage of the fact that, with the proliferation of online
        shopping, packets are constantly arriving at our doorsteps and in our corporate mailrooms. Hiding a tiny attack
        device in those is easy. “The [attack] device, a 3G-enabled, remotely controlled system, can be tucked into the
        bottom of a packaging box or stuffed in a child’s teddy bear (a device no bigger than the palm of your hand)
        and delivered right into the hands or desk of an intended victim,”

                Source: https://www.helpnetsecurity.com/2019/08/07/warshipping/



        It's not just Equifax: Here's every major security breach and data hack so far - Data breaches are scary.
        Scariest of all is that they can come at any time, to any of the financial institutions you trust. Hackers take
        advantage of loopholes in institutions' servers and security protections to steal your most personal and
        sensitive information -- credit and debit card numbers, Social Security data, your birth date and maybe even
        where you live.

                Source: https://www.cnet.com/how-to/its-not-just-equifax-heres-every-major-security-breach-and-
                data-hack-so-far/












                                                    www.accumepartners.com
                                                                                                                     5
   1   2   3   4   5   6   7   8   9   10