- 1. Over 800 million medical records exposed in data breach – Sacut Cyber Security
an American medical artificial intelligence platform, containing 886,521,320 records.
The total size of the dataset was 68.53 GB and contained U.S.-based medical-related data. The type of data collected was divided into the following sections:
Date, document type, physician note, encounter IDs (An interaction between a patient and healthcare provider(s) to provide healthcare service(s)), patient ID, note, UUID, patient type, doctor notes, date of service, note type (example Nursing/other), and detailed note text.
- 2. FBI director asks US businesses to work with it to foil Chinese espionage
The head of the FBI urged US companies on Thursday to develop closer ties with it to counter a “multi-avenue” effort by Beijing to amass enough intellectual property to “become the world’s only superpower”.
Suggests establishing partnerships with the agency’s local offices – before breaches occur like the Microsoft Exchange email server hack discovered earlier this year.
- 3. Iranian hackers take down servers of Israeli internet hosting company Cyberserve
Black Shadow hacking group, which hit Shirbit insurance firm last year, takes public transport companies, children’s museum and other sites offline; warns of data leak.
Retaliation for gas pump hack or are they just continuing the cyber jousting?
- 4. New ‘Shrootless’ Bug Could Let Attackers Install Rootkit on macOS Systems
Last week, Microsoft disclosed details about a new vulnerability (CVE-2021-30892) dubbed "Shrootless" that could be exploited by attackers to bypass macOS security restrictions and assume complete control over targeted devices to perform arbitrary operations on compromised devices without being flagged by security solutions.
- 5. APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
VPNs which have become essential for many organizations since the pandemic's onset, are a popular target for cyberattacks. Incident response teams say these attacks on VPNs aren't new, but attackers are finding new and sophisticated ways to compromise enterprise VPNs.
- 6. TA575 criminal group using ‘Squid Game’ lures for Dridex malware – The Cyber Post
Cybersecurity firm Proofpoint has found evidence of a prolific cybercrime group using the popularity of Netflix hit “Squid Game” to spread the Dridex malware.
- 7. ‘Trojan Source’ Hides Invisible Bugs in Source Code – Sacut Cyber Security
Researchers say they have uncovered a new attack method they have dubbed "Trojan Source attacks" in which attackers could exploit how Unicode handles script ordering to encode potentially malicious source code in such a way that human reviewers will only see the harmless version of the code while compilers see the nefarious version.
The Trojan Source attack method exploits the difference between how text renderers display information versus how a compiler processes it.
- 8. Ransomware cybercriminals linked to Norsk Hydro attack fall prey to Europol swoop
Europol says it has successfully disrupted operations of the high-profile, "professional, highly organized" ransomware group responsible for thousands of "devastating" attacks, including the one that hit Norsk Hydro, after successfully targeting 12 group members.
- 9. FBI warns of fake govt sites used to steal financial, personal data
The FBI warned the US public that threat actors actively use fake and spoofed unemployment benefit websites to harvest sensitive financial and personal information from unsuspecting victims.
- 10. War-Driving – Still an Easy Bet for Household Wi-Fi attacks
The old-time war-driving technique is still proving an efficient way to crack WiFi passwords. Recently, a researcher in Israel was able to crack 70% of WiFi network passwords after collecting network hashes via war-driving.
- 11. 40% of organizations suffered a cloud-based data breach in the past 12 months – Help Net Security
Despite increasing cyberattacks targeting data in the cloud, 83% of businesses are still failing to encrypt half of the sensitive data they store in the cloud, raising even greater concerns as to the impact cyber criminals can have. 40% of organizations have experienced a cloud-based data breach in the past 12 months, according to a study conducted by 451 Research.
- 12. FBI: HelloKitty ransomware adds DDoS attacks to extortion tactics
The FBI has sent out a flash alert warning private industry partners that the HelloKitty ransomware gang (aka FiveHands) has added DDoS attacks to their arsenal of extortion tactics.
- 13. FBI: Ransomware targets companies during mergers and acquisitions
The Federal Bureau of Investigation (FBI) warns that ransomware gangs are targeting companies involved in "time-sensitive financial events" such as corporate mergers and acquisitions to make it easier to extort their victims.
- 14. Researchers Uncover ‘Pink’ Botnet Malware That Infected Over 1.6 Million Devices
Cybersecurity researchers disclosed details of what they say is the "largest botnet" observed in the wild in the last six years, infecting over 1.6 million evices primarily located in China, with the goal of launching distributed denial-of-service (DDoS) attacks and inserting advertisements into HTTP websites visited by unsuspecting users.
Mainly targeting MIPS-based fiber routers, the botnet leverages a combination of third-party services such as GitHub, peer-to-peer (P2P) networks, and central command-and-control (C2) servers for its bots to controller communications, not to mention completely encrypting the transmission channels to prevent the victimized devices from being taken over.
- 15. Yahoo is the third major US tech platform to exit China in the past month
Yahoo announced today (Nov. 2) that it will no longer operate in China as the country tightens data and privacy regulations that are making it increasingly difficult for US companies to operate there.