Cybersecurity News & Analysis | SC Media | Info Security News


House panel says Equifax breach was ‘entirely preventable’


The House Oversight and Government Reform Committee released a scathing report Monday saying the Equifax data breach, one of the largest in U.S. history, was “entirely preventable.” The Republican-authored report is the result of a 14-month probe in which the committee reviewed more than 122,000 pages of documents, interviewed three former employees directly involved with Equifax’s IT operations,…

Microsoft Patch Tuesday includes fix for actively exploited zero-day


Microsoft addressed nearly 40 vulnerabilities including and actively exploited zero-day, in its December 2018 Patch Tuesday release. Several of the issues were rated critical or important and or dealt with remote code execution flaws in Windows including one vulnerability that was actively being exploited in the wild. “One of the most important flaws is a…

Cybercriminal phishing campaign spoofs Russian critical infrastructure domains


A cybercriminal phishing operation designed to infect victims with a malicious backdoor was recently discovered using command-and-control domains that intentionally spoofed the real-life domains of various Russian critical infrastructure firms. The campaign’s focus on critical infrastructure at first gave it the appearance of an APT-sponsored cyberespionage operation, but upon closer inspection, the motivation appears to…

North Texas hospital breach exposes payment info on $47,000


A breach discovered September 29 at Baylor Scott & White Medical Center – Frisco may have compromised the payment information of about 47,000 patients or guarantors. The hospital said the issue originated with a third party’s credit card processing system, prompting it to terminate credit card processing through that vendor. A follow-up investigation found that…

Patch Tuesday

Patch Tuesday: 87 CVEs, 39 critical


This Patch Tuesday, Adobe has published a security bulletin for Adobe Acrobat and Reader to address critical and important vulnerabilities, which could lead to arbitrary code execution in the context of the current user.   The vulnerabilities include five Critical arbitrary code execution flaws, a Critical privilege escalation flaw, and three Important Information Disclosure flaws, according to the…


Researchers discover 40,000+ compromised credentials for global gov’t websites


Over the last year and a half, attackers compromised more than 40,000 credentials for various global government websites and portals, using a combination of spyware tools and phishing tactics. Portals hosts in more than 30 countries were affected by the campaign, with the majority of victimized users located in Italy (52 percent), Portugal (22 percent)…

Topeka billing system data breach, 10,000 potentially affected


Topeka’s third-party payment vendor was breached for just over one month possibly exposing the personal information of about 10,000 residents. Topeka officials learned on December 7 when vendor Central Square, which handles the city’s billing payment system, informed the city of the incident, officials said in a statement. About 10,000 people may have been affected and…

Second Google+ bug hastens shutdown


After a second, newly discovered, bug affected 52.5 million Google+ users, Google has decided to shutter the social network earlier than originally planned. “We’ve recently determined that some users were impacted by a software update introduced in November that contained a bug affecting a Google+ API,” David Thacker, vice president of product management for G…

City of North Bend hit with ransomware


The city of North Bend, Ore., was hit with a ransomware attack which temporarily locked out city workers from their computers and databases. “One weekend morning a few weeks back all of our servers and things locked up, and we received a ransomware note that said for $50,000 in Bitcoin these people would provide us…

Seedworm cyberespionage gang using new tricks to dig up info


Researchers used an attack on a Brazilian-embassy computer to uncover additional details on the year-old cyberespionage group Seedworm, including a new backdoor the group is now using. Symantec found Seedworm and APT28 on a computer in the Brazilian embassy in what the company described as an oil producing country and since this was an oddity…

Next post in News