It’s Way Too Easy to Get a .gov Domain Name

Credit to Author: BrianKrebs| Date: Wed, 27 Nov 2019 02:08:55 +0000

Many readers probably believe they can trust links and emails coming from U.S. federal government domain names, or else assume there are at least more stringent verification requirements involved in obtaining a .gov domain versus a commercial one ending in .com or .org. But a recent experience suggests this trust may be severely misplaced, and that it is relatively straightforward for anyone to obtain their very own .gov domain.

Read more

Would ‘Medicare for All’ help secure health data?

Credit to Author: Adam Kujawa| Date: Tue, 26 Nov 2019 20:30:10 +0000

Beyond the usual arguments on this subject, we wanted to ask the question: Are there any security risks we need to be worried about if the United States were to switch to ‘Healthcare for All’ policies?

Categories:

Tags:

(Read more…)

The post Would ‘Medicare for All’ help secure health data? appeared first on Malwarebytes Labs.

Read more

Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant

Credit to Author: Eric Avena| Date: Tue, 26 Nov 2019 18:09:21 +0000

In Gartner’s annual Magic Quadrant for Enterprise Information Archiving (EIA), Microsoft was named a Leader again.

The post Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant appeared first on Microsoft Security.

Read more

Insights from one year of tracking a polymorphic threat

Credit to Author: Eric Avena| Date: Tue, 26 Nov 2019 17:00:56 +0000

We discovered the polymoprhic threat Dexphot in October 2018. In the months that followed, we closely tracked the threat as attackers upgraded the malware, targeted new processes, and worked around defensive measures. One year’s worth of intelligence helped us gain insight not only into the goals and motivations of Dexphot’s authors, but of cybercriminals in general.

The post Insights from one year of tracking a polymorphic threat appeared first on Microsoft Security.

Read more

Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read more

Sale of 4 Million Stolen Cards Tied to Breaches at 4 Restaurant Chains

Credit to Author: BrianKrebs| Date: Tue, 26 Nov 2019 13:32:21 +0000

On Nov. 23, one of the cybercrime underground’s largest bazaars for buying and selling stolen payment card data announced the immediate availability of some four million freshly-hacked debit and credit cards. KrebsOnSecurity has learned this latest batch of cards was siphoned from four different compromised restaurant chains that are most prevalent across the midwest and eastern United States.

Read more

Exposed: Amazon EBS and RDS Exposure

Credit to Author: Rich Beckett| Date: Tue, 26 Nov 2019 14:20:33 +0000

Cloud breaches go beyond S3 buckets, virtual hard drive snapshots and database services are just as vulnerable and can be the keys to your kingdom.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/2V6Ohp8Vh2s” height=”1″ width=”1″ alt=””/>

Read more