Plus: Chinese hackers have targeted Australian energy operators
Part of Network | |
Presented by |
TikTok has denied being hacked after last week's data leak reports. TikTok claims that neither the source code nor customer data that was published in forums belong to the company. More: - A hacker group published the data last week, claiming they have 790GB worth of materials stolen from TikTok and WeChat.
- The group tracked as AgainstTheWest is known to target countries that are perceived as working against Western interests, as details about the threat actor are sparse.
- The list of targeted countries includes China, Russia, North Korea, Iran, etc.
- TikTok has denied the claims, saying that the company's security team has reassured them that the data in question does not belong to them and has never been deployed.
- Security researchers have claimed that the hacker group's leaked files show at least a partial data breach. At the same time, they expect to see more in the upcoming days to confirm whether TikTok purposefully denies the leak.
| |
Samsung has confirmed that it was hacked in July 2022. According to the company, hackers managed to steal U.S. customer data. More: - Samsung claims it only tracked the cyberattack on August 4th, 2022.
- Hackers stole names, last names, product registration information, and demographics.
- According to the South Korean giant, the threat actor could not breach credit card information.
- To ensure customer safety, Samsung stated that it has announced law authorities and has hired a third-party cybersecurity company.
- The bug that the unknown threat actor used has been patched, while the company has urged its users to be careful regarding emails that ask them for log-in credentials and seem suspicious.
| |
A message from QUANTUM Effective and Reliable Data Storage Protection that Scales on Your Terms and Budget Data recovery is possible across the entire lifecycle - and air-gapped protection is both the safest and the lowest TCO. Successful Ransomware attacks can take months to fully recover from - especially when targeted campaigns wipe out clusters of servers. So why not choose a solution that protects and recovers at any point in your data’s lifecycle? With different tiers, you’re able to ensure availability of data without compromise. You’re able to balance cost while maximizing efficiency. No one can stop ransomware or fully prevent it from taking place - but you can make sure you’re protecting your customers and your data by ensuring that there is a fully air-gapped solution. Request A Demo | |
The U.S. Government has forbidden three former NSA employees to access security information for the upcoming three years. The individuals helped the United Arab Emirates spy on U.S. companies. More: - The three former NSA employees will not be able to have information regarding International Traffic in Arms Regulations.
- These three individuals are named Ryan Adams, Marc Baier, and Daniel Gericke.
- Besides the security clearance, the three former employees will also have to pay $1.7M in damages.
- Officials from the FBI have stated that this development sends a clear message to those with malicious intent toward the U.S.
| |
Chinese hackers have targeted Australian energy operators. The threat actor responsible for the breach is believed to be APT40. More: - The cyberattack is believed to have occurred between April and June.
- Hackers targeted energy companies in Asia-Pacific by attempting to infect employees with malware through a fake news portal.
- Threat actors emailed numerous company employees, asking for feedback regarding their website.
- Once the victims would click the links, hackers would be able to log keystrokes and access other sensitive data.
| |
A message from NORDLAYER NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. We help organizations of all sizes to fulfill scaling and integration challenges when building a modern secure remote access solution, within an ever-evolving SASE framework. Why NordLayer? - Quick and easy to integrate with existing infrastructure
- Hardware-free
- Designed with ease of scale in mind
NordLayer meets the varying growth pace and ad-hoc cybersecurity requirements of agile businesses and distributed workforces today. Try NordLayer | |
Belarusian hacktivists are trying to topple the government by selling NFTs that contain stolen data. The group is tracked as the Cyber Partisans. More: - The Cyber Partisans have created fake digital passports with government officials' identities, using information they leaked on the internet.
- The NFTs were listed on OpenSea, but the popular marketplace removed the collection due to privacy issues.
- This hacktivist group came to mainstream attention after breaching Belarus' national database and leaking the passport information of numerous government officials.
- Cyber Partisans is comprised of nearly 60 people.
| |
Quick Hits: - Origin Investments’ IncomePlus Fund has seen its 27th consecutive month of positive returns, generating 18.7% over the past 12 months.*
- A security flaw in a Genshin video game driver is being used to breach targets and spread ransomware. The threat can be deployed even if the target doesn't have the game downloaded to their device.
- Sharkbot, malware known for breaching Android users, has re-appeared in two productivity apps tracked as Mister Phone Cleaner and Kylhavy Mobile Security. The two apps have over 60,000 downloads.
- Security researchers have tracked malware that can track key logs, create data copies, and steal data from private messaging platforms. This variant is being sold as a RaaS for $100 for a monthly subscription or a $900 lifetime subscription.
*This is sponsored content. | |
Upcoming events at Inside: - September 07 - AMA with Andrew Gazdecki (Founder of MicroAcquire) (Register Here)
- September 09 - AMA with Jay Ryan (U.S. Federal Government Program Manager at Security Compass) (Register Here)
- September 14 - What Do Developers Think of Threat Modeling? (feat. security experts from Security Compass, Dell, and Tricentis) (Register Here) *
- September 14 - AMA with Brian Dean (Founder of Backlinko) (Register Here)
- September 21 - AMA with Kristen Ruby (Founder of Ruby Media Group) (Register Here)
- September 28 - AMA with Leigh-Ann Buchanan (Founder of aīre ventures) (Register Here)
- October 05 - AMA with Ram Bartov (Chief Accounting Officer at TripActions)* (Register Here)
- October 12 - AMA with Bill Glenn (Executive Chairman at Crenshaw Associates) (Register Here)
- October 19 - AMA with Zecca Lehn (Responsibly VC) (Register Here)
- October 25 - Meet Our Fund 4, an Inside.com Summit (Register Here)
*This is a sponsored listing. | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Vibha Chapparike is a Freelance Writer & Editor at Inside.com. With her post-graduation in Management and Finance completed, Vibha is expanding her knowledge in Venture Capital, Business, and Startups. Previously, she had a career in Public Relations and Communications with Women in Cloud - an organization on a mission to create $1B in economic access for female technology entrepreneurs. An ardent reader and writer currently residing in Singapore, you can follow Vibha on Twitter @VChapparike. | |
With Quantum, we shift the focus from accumulating data to making it work for you. | |
|
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|