Plus: Amazon patches high-severity bug
Part of Network | |
Presented by |
Israel's IDF Unit 8200 helped stop a cyberattack on U.S. power plants. The announcement was made by the deputy chief of Unit 8200. More: - IDF members realized that an attack on the U.S. power plants was brewing while they fought attacks on Israel's water system.
- The unit then informed law authorities in the U.S.
- The rest of the details were not presented due to the classified nature of the information, but similar attacks throughout the world have shown that energy remains one of the most targeted sectors by hackers.
- IDF Unit 8200 is the military intelligence unit of the IDF. The unit is highly secretive and consists of the most elite cyber specialists in Israel.
Zoom Out: - Israel's intelligence authorities have previously warned the U.S of other cyber attacks, such as the Kaspersky antivirus data-stealing case.
| |
NATO plans to create a cyber rapid response force as a way of increasing its readiness to combat potential threat actors. The military alliance stated that it intends to respond to both Russia and China if they conduct cyber attacks. More: - After NATO's Madrid Summit, the 30 member countries have decided to launch several new initiatives. One of these initiatives is creating a cyber rapid response force. The cyber rapid response force would allow the alliance to collaborate and deal with imminent threats.
- NATO stated that cybersecurity has been an increasingly larger part of the conversation throughout the world and that the recent war in Ukraine has proven how important cybersecurity is in combating not only attacks against vital infrastructure but also propaganda. NATO is also planning to help Ukraine improve its cybersecurity capabilities.
- The alliance also mentioned China as a factor that is working against the values that NATO upholds and stated that it will work to combat any asymmetric threat that may present itself.
| |
A message from SECURITY COMPASS Current approaches to Threat Modeling simply don’t work. - They are manual and inconsistent
- They take too long
- They don’t scale
- They don’t give developers what they need
Here you can find a series of posts breaking down how you can anticipate threats earlier in the software development life cycle to create more secure software. Learn more about current threat modeling challenges. See how a new, developer-centric approach to threat modeling can help your organization deliver secure software faster. Read Series on Threat Modeling And, yes, we understand that threat modeling is a time-consuming process that requires the expertise of security professionals and figuring out the best approach to mature application security programs can be difficult, especially with increasing internal demands for a faster time to market. According to this Total Economic Impact™study, SD Elements enabled its users to decrease the time needed to develop security requirements for products by 90%. See how | |
North Korea-backed hacker group Lazarus is believed to have been the threat actor that stole $100M from Harmony Bridge. The group is known for similar hacks, including the Axie Infinity breach. More: - Horizon Bridge is a blockchain solution that enables users to transfer tokens between different networks such as Ethereum, Binance Chain, Bitcoin, etc.
- The Harmony protocol was hacked on June 23. The company put a bounty of $1M on anyone who had information regarding the hack.
- Researchers have now claimed that the hack was done by the Lazarus Group. The hacker collective is known for many attacks, especially in the cryptocurrency space. Lazarus is believed to be backed by the North Korean state.
- A number of cryptocurrencies were converted to ETH on the day the attack happened, leading researchers to believe that Lazarus used Uniswap, a cryptocurrency exchange, to convert all the stolen crypto to 85,837 ETH. A smaller amount was later on separated into different Ethereum wallets.
- Horizon is offering to let the threat actor keep $10M if it returns the rest of the stolen cryptocurrencies.
| |
Amazon patched a high-severity bug that affected the Amazon Photos app on Android. The flaw could have allowed hackers to steal a user's Amazon access token. More: - Amazon access tokens are used to authenticate a user when they are using different Amazon apps. This means that these tokens hold personal information on the user that could be potentially sold on illegal forums and marketplaces.
- The Amazon Drive API, a key API for Amazon's Photos cloud service, was vulnerable to HTTP request manipulation. Once a threat actor sent a request, the server accepting it was susceptible to being controlled. From there, hackers could have used the access to download and delete files, as well as possibly use ransomware.
- Amazon has reportedly patched the bug in a recent update after being notified by researchers.
Zoom Out: - An Amazon ex-employee was recently convicted after being found guilty of leaking the data of more than 100 million users.
| |
AMD is investigating reports that the RansomHouse gang hacked it. The group claims it owns internal data and that it will leak it on the internet. More: - The RansomHouse gang claims that it has over 450GB of financial data from AMD, which may be sold online for a profit.
- There are around 70,000 devices that were reportedly hacked, while the group has not offered any proof yet.
- The method with which the devices were hacked seems to be brute-force, evidenced by the weak passwords that were leaked on the group's website.
Zoom Out: - RansomHouse has been active with similar attacks, recently breaching the African supermarket chain Shoprite.
| |
Quick Hits: - Assets are getting larger, and end-users have you stuck between the cloud and a hard place. Deliver far beyond user expectations with Cox Edge’s CDN.*
- Researchers have presented a new open-source tool for scanning possibly malware-infected files.
- The cybersecurity industry is facing a number of layoffs due to the recent economic woes, defying claims that the industry was immune to economic crisees.
- Trinsic announced that it has raised an $8.5M seed round.
- This AI-powered UI test automation tool gives developers an easy way to author self-healing cross-browser tests.*
*This is a sponsored post. | |
Upcoming events at Inside: - June 30 - HR Strategies to Retain Remote Employees (Register Here)
- July 20 - The Rise of Metaverse Gaming (Register Here)
- August 17 - Build Your Diversified Portfolio: How To Invest in Bear Markets (Register Here)
- September 14 - Are Electric Cars Worth It? (Register Here)
| |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 Ford. | |
Security Compass is on a mission to accelerate software time-to-market while managing risk. | |
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|