Plus: Google tracks malware that steals data from users' emails
Part of Network | |
Presented by |
Twitter's former head of security has claimed that some Twitter employees may work for foreign intelligence and that the company has serious security issues. The former executive also stated that numerous employees access sensitive data without any monitoring. More: - The former head of Twitter's security, Peter Zatko, claims that the company has misled its board to believe that the situation is much better than it is in reality.
- Zatko claims that Twitter does not delete customer data even after users delete their accounts. Furthermore, the company allegedly has lied about doing so to government regulators.
- According to him, he was fired in January because he presented technical security flaws in front of Twitter board members. Twitter, on the other hand, claims that he was fired due to poor performance.
- Alex Spiro, Elon Musk's lawyer, has stated that Zatko has been subpoenaed.
| |
The CEO of Israeli spyware maker NSO Group has resigned. Shalev Hulio will be replaced by the company's current COO. More: - NSO is an Israeli cybersecurity company that is best known for creating the Pegasus spyware.
- Another 100 positions will be restructured and cut in the company as part of a new management plan.
- Pegasus spyware made headlines after reports that NSO had sold the software to multiple governments so that they could spy on private conversations.
- NSO was added to the U.S. export blacklist in 2021, while companies such as WhatsApp have also accused the company of tapping into private conversations.
- The spyware was even used to spy on high-ranking officials such as the Spanish prime minister and EU commissioners.
| |
A message from QUANTUM Avoid Paying a Ransom - Get the Ultimate Backup Guide Before You Need It Paying a ransom may sound like the best case scenario: get your data back, make your customers feel worth it. But actually, it can affect your business in other ways and may, in some cases, be illegal. Make sure your systems are protected across the entire data lifecycle - and never pay a ransom again. You’re able to balance cost while maximizing efficiency. No one can stop ransomware or fully prevent it from taking place - but you can make sure you’re protecting your customers and your data by ensuring that there is a fully air-gapped solution. Request A Demo | |
The FBI has warned of hackers taking over IP addresses to cover their tracks. Over 175,000 victims are believed to have been breached through credential stuffing. More: - The FBI cooperated with the Australian Police in an operation that uncovered over 300,000 unique addresses that were affected by the hacking campaign.
- Hackers are believed to have made over $400,000 during this timespan.
- According to the statement, hackers are using the fact that security protocols do not automatically detect residential proxies as a threat to their advantage and that the combination of easy-to-access online tutorials combined with cracking tools has made credential stuffing hacking campaigns more common.
Zoom Out: - Researchers believe hackers attempted over 193 billion credential stuffing attacks in 2020.
| |
Google has tracked a malicious tool that steals data from private email accounts. The tool is believed to have been created by a threat actor known as Charming Kitten. More: - Charming Kitten is believed to be backed by the Iranian government.
- The group is also known as APT35, Cobalt Illusion, ITG18, Phosphorus, TA453, and Yellow Garuda
- This malware has been named Hyperscrape and is believed to have affected at least six victims since its inception in 2020.
- Hyperscrape is able to delete warning emails sent from Google and gather all customer data in a downloadable file.
- Victims are usually breached by clicking on a malicious link.
- Google has reportedly notified all of the victims regarding the breach.
Zoom Out: - Charming Kitten has used similar malware in the past. In 2019, the group was deploying Little Looter, malicious software that was able to breach cameras and microphones in mobile devices.
| |
A message from WIND RIVER Are you getting the most out of your simulation tools? With 25% of all employees expected to work remotely in 2022 (LinkedIn), companies must find new ways to provide their developers with access to the necessary hardware. Wind River® can help. With hardware simulation coupled with cloud capabilities, development can continue full force, regardless of where the hardware is. You will learn: - How simulation can enable new or support existing workflows
- What cloud capabilities can add to the development pipeline
- Why both tools together are necessary in a dispersed working environment
Register Now | |
CISA will receive $45M in government funding. The funds will be donated by the Department of Energy. More: - The Department of Energy aims to fund 15 cybersecurity projects to increase defense capabilities in the U.S. energy industry.
- DOE officials stated that programs like this are important due to the rising number of cases where energy grid networks are attacked by foreign actors.
- Officials also referenced the Colonial Pipeline hack as an example of how important protecting energy resources is.
- The funding will be deployed in six areas:
- automated cyberattack prevention and mitigation,
- security and resiliency by design,
- the authentication mechanism for energy delivery systems,
- automated methods to discover and mitigate vulnerabilities,
- cybersecurity through advanced software solutions,
- and integration of new concepts and technologies with existing infrastructure.
| |
Quick Hits: - Top companies are planning their holiday gifting now. Here’s why their gifts are sure to be a success.*
- Iranian hackers are believed to have targeted numerous Israeli organizations with spyware, according to researchers.
- XCSSET malware operators have changed the variant yet again. This time, the malware is falsely presented as a notes app to the victims it targets.
- CISA has added a new security flaw to its list of vulnerabilities. The flaw is being tracked as CVE-2022-0028 and has a CVSS rating of 8.6. The flaw concerns a reflected amplification denial-of-service vulnerability in URL filtering.
- A new security flaw tracked as Gairoscope enables hackers to steal information through soundwaves, even if the computer is air-gapped.
- Five ways you can use content and data to create a cycle of unforgettable customer experiences.*
*This is sponsored content. | |
Upcoming events at Inside: - August 24 - AMA with Matt Mahar (CEO at Cana) (Register Here)
- August 30 - An overview of simulation and cloud tools in embedded software (Register Here) *
- August 31 - AMA with Sophia Amoruso (CEO at Business Class) (Register Here)
- September 07 - AMA with Andrew Gazdecki (Founder of MicroAcquire) (Register Here)
- September 09 - AMA with Jay Ryan (U.S. Federal Government Program Manager at Security Compass) (Register Here)
- September 14 - AMA with Brian Dean (Founder of Backlinko) (Register Here)
- September 21 - AMA with Kristen Ruby (Founder of Ruby Media Group) (Register Here)
- September 28 - Free Access to the Semantic Layer Summit with 30+ Enterprise Data Leaders (Register Here) *
- September 28 - AMA with Leigh-Ann Buchanan (Founder of aīre ventures) (Register Here)
- October 12 - AMA with Bill Glenn (Executive Chairman at Crenshaw Associates) (Register Here)
- October 25 - Meet Our Fund 4, an Inside.com Summit (Register Here)
*This is a sponsored listing. | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 and 1972 Fords. | |
With Quantum, we shift the focus from accumulating data to making it work for you. | |
|
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|