Security daily (27-07-2020)

Customer update: AWS and the EU-US Privacy Shield

Recently, the Court of Justice of the European Union (CJEU) issued a ruling regarding the EU-US Privacy Shield and Standard Contractual Clauses (SCCs), also known as model clauses. The CJEU ruled that the EU-US Privacy Shield is no longer valid for the transfer of personal data from the European Union (EU) to the United States […] (AWS Security Blog)

Burglars expose Walgreens customer data in a different kind of breach

Groups of unidentified thieves broke into multiple Walgreens stores in late May and early June and stole prescription information and other data on some 70,000 customers, a spokesman for the pharmacy chain said Monday. The assailants forced their way behind pharmacy counters and stole drug prescriptions, and also took a “very limited number of hard drives attached to stolen cash registers,” according to a letter Walgreens sent affected customers. Customers’ health insurance and vaccination information may have been swept up in the breach, Walgreens said, but credit card data and Social Security numbers were not affected. “Like many retailers, pharmacies and local businesses across the country, Walgreens recently had a number of its stores sustain varying degrees of damage as a result of vandalism and theft,” Walgreens spokesman Jim Cohn said. “Protecting our customers’ personal information is a top priority and something we take very seriously.  We’ve worked with local law enforcement, and are continuing to take […] The post Burglars expose Walgreens customer data in a different kind of breach appeared first on CyberScoop. (CyberScoop)

Garmin confirms ransomware attack, keeps quiet on possible Evil Corp. involvement

Finally, Garmin customers who have put off their exercise routine because of outages on the website and mobile app can lace up their running shoes again. Garmin said in a statement Monday that it has started restoring services following a ransomware attack that locked “some” systems on July 23. While the company says it has no indication that scammers accessed customer data, the attack did interrupt website functionality, customer support services, user apps and corporate communications, according to the statement. “Affected systems are being restored and we expect to return to normal operation over the next few days,” Garmin said. “We do not expect any material impact to our operations or financial results because of this outage.” The official update confirms prior reporting that hackers had infiltrated Garmin’s systems and demanded an extortion fee to allow the company to resume activity as normal. Garmin previously said its mobile app was […] The post Garmin confirms ransomware attack, keeps quiet on possible Evil Corp. involvement appeared first on CyberScoop. (CyberScoop)

Garmin staggers back online after ransomware attack

Garmin’s online services are beginning to come back to life after it was hit badly by ransomware last week. But did it pay a ransom to its attackers or not? (Graham Cluley)

Over 1000 Twitter staff and contractors had access to internal tools that helped hackers hijack accounts

As Twitter and law enforcement agencies investigate the high profile attack against Twitter accounts, there is a clear lesson for other businesses to learn. Read more in my article on the Bitdefender Business Insights blog. (Graham Cluley)

ProLock ransomware – new report reveals the evolution of a threat

Ransomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they'd never pay up. (Naked Security)

Monday review – our recent stories revisited

Our most recent articles and videos, all in one place. (Naked Security)

How to Use Leaked Password Databases to Create Brute-Force Wordlists

To name just a few companies, VK, µTorrent, and ClixSense all suffered significant data breaches at some point in the past. The leaked password databases from those and other online sites can be used to understand better how human-passwords are created and increase a hacker's success when performing brute-force attacks.

In other articles, we'll cover generating wordlists for use in password-cracking. But here, we'll learn how to create wordlists of statistical complexity and length based on actual passwords found in database leaks that occurred in recent years. Understanding how average... more (Null Byte « WonderHowTo)

DJI Drone App Riddled With Privacy Issues, Researchers Allege

(News ≈ Packet Storm)

Garmin Begins Recovery From Ransomware Attack

(News ≈ Packet Storm)

Hacker Actively Exploit High Severity Networking Vulnerabilities

(News ≈ Packet Storm)

Hackers Stole GitHub And GitLab OAuth Tokens From Git Analytics Firm Waydev

(News ≈ Packet Storm)

Reverse String WooCommerce WordPress Credit Card Swiper

As 2020 continues to be the worst year in almost anybody’s lifetime, allow me to take this opportunity to stoke the fires of your existential dread even further. As a sequel to my last blog post earlier this year about the credit card swiper that I found on a WordPress ecommerce website using WooCommerce, today I found another very noteworthy infection of the same variety. Credit Card Skimmer in /facebook-for-woocommerce/ The story starts the same way it always does: The client notified us that their customer’s credit cards were being compromised shortly after using their website to purchase a product. Continue reading Reverse String WooCommerce WordPress Credit Card Swiper at Sucuri Blog. (Sucuri Blog)

QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices

Cybersecurity agencies in the US and UK yesterday issued a joint advisory about a massive ongoing malware threat infecting Taiwanese company QNAP's network-attached storage (NAS) appliances.

Called QSnatch (or Derek), the data-stealing malware is said to have compromised 62,000 devices since reports emerged last October, with a high degree of infection in Western Europe and North America.

" (The Hacker News)

Learn Machine Learning and AI – Online Training Program @ 93% OFF

Within the next decade, artificial intelligence is likely to play a significant role in our everyday lives. Machine learning already powers image recognition, self-driving cars, and Netflix recommendations.

For any aspiring developer, learning how to code smart software is a good move. These skills are highly valued in tech, finance, sales, marketing, and many other sectors.

The Hacker News (The Hacker News)

Researchers Reveal New Security Flaw Affecting China's DJI Drones

Cybersecurity researchers on Thursday revealed security issues in the Android app developed by Chinese drone-maker Da Jiang Innovations (DJI) that comes with an auto-update mechanism that bypasses Google Play Store and could be used to install malicious applications and transmit sensitive personal information to DJI's servers.

The twin reports, courtesy of cybersecurity firms Synacktiv and (The Hacker News)

Microsoft Revamps Windows Insider Preview Bug Bounty Program

Researchers can earn up to $100,000 for finding vulnerabilities in Microsoft's revamped Windows Insider Preview bug bounty program. (Threatpost)

Attackers Exploiting High-Severity Network Security Flaw, Cisco Warns

Attackers are exploiting a high-severity vulnerability in Cisco's network security software products, which is used by Fortune 500 companies. (Threatpost)

Encryption Under ‘Full-Frontal Nuclear Assault’ By U.S. Bills

The U.S. government and tech companies continue to butt heads over the idea of encryption and what that means for law enforcement. (Threatpost)


/security-daily/ 28-07-2020 23:44:23