Plus: New Google Chrome flaw enables hackers to replace clipboard content
Part of Network | |
Presented by |
U.S. police may have used smartphone tracking tools without obtaining warrants. Researchers claim that this software was used by the police in California and North Carolina. More: - The Associated Press claims that police authorities in Southern California and North Carolina used spyware named Fog Reveal.
- The software may have begun being used as early as 2018. The product was created by a Virginia-based company named Fog Data Science.
- In order to do so, the company bought private data from advertising agencies and used that data to track its targets based on their interests and activity.
- Fog Data Science sold the software to 20 clients, with prices starting at $7,500 per year.
- The company has denied the claims, stating that its software is not illegal since the data is sold without giving away the identity of its targets, but others have claimed that this can be easily undone by law authorities.
| |
Montenegro has been hit by a ransomware attack from the Cuba ransomware gang. Hackers are demanding $10M in ransom. More: - Government officials have alluded that the cyberattack may have been organized by Russia.
- The Cuba ransomware gang is believed to be responsible for the breach. The group published documents that allegedly belonged to the Montenegrin government. The leaks include financial statements, bank account details, source code, etc.
- Montenegro has asked for support from NATO to identify and deal with the consequences of the cyber attack.
- The Cuba ransomware group has consistently updated its tools. Multiple new malware variants and encryptor tools have been added in the last few months.
- The attacks mark a shift in the group's focus, as Cuba only targeted U.S. organizations in 2021.
Zoom Out: - Other Balkan countries have also been hit by cyberattacks recently. Albania, another NATO member of the Balkan region, was breached only a few weeks ago.
| |
A message from NORDLAYER NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. We help organizations of all sizes to fulfill scaling and integration challenges when building a modern secure remote access solution, within an ever-evolving SASE framework. Why NordLayer? - Quick and easy to integrate with existing infrastructure
- Hardware-free
- Designed with ease of scale in mind
NordLayer meets the varying growth pace and ad-hoc cybersecurity requirements of agile businesses and distributed workforces today. Sign up Today | |
Cybersecurity unicorns may have a record year in 2022. The pace of unicorns being created in the first half of 2022 has outpaced the same period in 2021. More: - There were 36 cybersecurity unicorns created in 2021.
- Despite the record pace in cybersecurity unicorn creation, global funding for cybersecurity startups has dropped by 32% QoQ.
- Funding in 2022 so far stands at $4.4B, the lowest since 2020.
- Rounds that exceed $100M or more have also dropped by 50%.
| |
A recently tracked Google Chrome flaw enables hackers to replace clipboard content. The bug was tracked on Aug. 28. More: - The researcher who tracked the flaw stated that the bug also affects Safari and Firefox, but Chrome affected users on numerous actions that they took during their browsing session.
- Hackers could use the flaw to replace the content that a target sees on a webpage with the content of their choosing. This content could likely contain malware that would infect the target.
- According to the researcher, Google has been made aware of the bug, but the company has not patched it yet.
Zoom Out: - Apple has recently struggled with Safari security issues. The company released an update that patched an emergency flaw that affected iPhones, Macs, and iPads.
| |
A message from QUANTUM Avoid Paying a Ransom - Get the Ultimate Backup Guide Before You Need It Paying a ransom may sound like the best case scenario: get your data back, make your customers feel worth it. But actually, it can affect your business in other ways and may, in some cases, be illegal. Make sure your systems are protected across the entire data lifecycle - and never pay a ransom again. You’re able to balance cost while maximizing efficiency. No one can stop ransomware or fully prevent it from taking place - but you can make sure you’re protecting your customers and your data by ensuring that there is a fully air-gapped solution. Request A Demo | |
North American beverage companies are hiring more cybersecurity experts than other industries. Cybersecurity roles in North America comprised 48% of total cybersecurity jobs, up from 35.1% in Q2 2021. More: - The U.S. led new cybersecurity job ads in 2022, with a 42% increase compared to Q2 2021.
- In the beverage industry, 17% of the total cybersecurity jobs posted were from U.S. companies, the most out of all countries.
- Plano leads the list with 4.4% of job openings being in the city, while other international cities such as Lausanne also had many job openings, with 3.5% of total positions being in the French-speaking town in Switzerland.
- Two other countries that round up the list of countries with the most job openings are The Netherlands and India.
| |
Quick Hits: - Fix your email overload for as little as $7.00 a month.*
- The U.S. government has released new security protocol guidance rules for the supply chain. The guideline aims to protect the nation from possible cyberattacks that could block numerous aspects of the economy.
- The JuiceLedger group is believed to be responsible for the PyPi hacking campaign that was tracked in Aug. 2022.
- The Department of Defense will donate millions of dollars in grants to help the maritime industry in the U.S. become better prepared to face potential cybersecurity risks.
- The U.K. National Cyber Security Centre has published a new document regarding AI security.
- Amid the shifting landscape of embedded systems, developers turn to real-time operating systems when "good enough" isn't good enough.*
*This is sponsored content. | |
Upcoming events at Inside: - September 07 - AMA with Andrew Gazdecki (Founder of MicroAcquire) (Register Here)
- September 09 - AMA with Jay Ryan (U.S. Federal Government Program Manager at Security Compass) (Register Here)
- September 14 - What Do Developers Think of Threat Modeling? (feat. security experts from Security Compass, Dell, and Tricentis) (Register Here) *
- September 14 - AMA with Brian Dean (Founder of Backlinko) (Register Here)
- September 21 - AMA with Kristen Ruby (Founder of Ruby Media Group) (Register Here)
- September 28 - AMA with Leigh-Ann Buchanan (Founder of aīre ventures) (Register Here)
- October 05 - AMA with Ram Bartov (Chief Accounting Officer at TripActions)* (Register Here)
- October 12 - AMA with Bill Glenn (Executive Chairman at Crenshaw Associates) (Register Here)
- October 19 - AMA with Zecca Lehn (Responsibly VC) (Register Here)
- October 25 - Meet Our Fund 4, an Inside.com Summit (Register Here)
*This is a sponsored listing. | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 and 1972 Fords. | |
|
With Quantum, we shift the focus from accumulating data to making it work for you. | |
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|