Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


North Korean Malicious Cyber Activity

Original release date: April 10, 2019

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as HOPLIGHT—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Malware Analysis Report (MAR) MAR-10135536-8 and the page on HIDDEN COBRA – North Korean Malicious Cyber Activity for more information.

AR19-100A: MAR-10135536-8 – North Korean Trojan: HOPLIGHT


Mar-a-Lago intruder had instant-malware-inflicting thumb drive

Chinese woman attacks the President’s staff!  Ms. Zhang’s infected USB drive instantly went to work on a Secret Service agent’s PC. He shut it down immediately “to halt the corruption.”


Two robocallers fined $3m for Google listings scam

Finally!  The robocall scammers were defrauding small businesses who were scared of seeing their Google search listings drop off.


Two teens charged with jamming school Wi-Fi to get out of exams

These guys are looking to get a cybersecurity job!  They’re facing charges of computer criminal activity after allegedly disrupting the network at the request of their friends.


What Should You Do When Your Identity Is Stolen: Credit Freeze or Fraud Alert?

If your identity is stolen, what’s better: A credit freeze or fraud alert?  Discover your best options after finding suspicious activity on your credit report.


Knock and don’t run: the tale of the relentless hackerbots

If you have an IoT device in your home, you could be receiving an average of 13 login attempts to these devices per minute, according to Matt Boddy’s latest research.


Hacker unlocks Samsung S10 with 3D-printed fingerprint

According to a video posted on the Imgur site Friday, it’s possible to bypass the biometrics on the new Galaxy S10 range using a 3D-printed fingerprint in minutes.


Google Releases Security Update for Chrome

Original release date: April 23, 2019

Google has released Chrome version 74.0.3729.108 for Windows, Mac, and Linux. This version addresses multiple vulnerabilities that an attacker could exploit to take control of an affected system.  The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary update.


Dutch NCSC Releases Updated TLS Guidelines

Original release date: April 23, 2019

The Dutch National Cyber Security Centre (NCSC) has published an update to their Transport Layer Security (TLS) protocol guidelines, which aim to improve TLS configuration security.  The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Dutch NCSC IT Security Guidelines for Transport Layer Security.


 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Owner of the WyzCo Group Inc. In addition to consulting on security products and services, Bob also conducts security audits, compliance audits, vulnerability assessments and penetration tests. Bob also teaches Cybersecurity Awareness Training classes. Bob works as an instruction for CompTIA’s non-profit IT-Ready Program in the Twin Cities. IT-Ready is a tuition free 8-week program designed to teach students of all ages the fundamentals of IT support to prepare them for an entry level position in Information Technology Support. Graduates of the classes take the exams to become CompTIA A+ certified. Bob is a frequent speaker at conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. Bob has been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com
  Related Posts

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.