?? Cybersec & Digital Insider Ed. 12: Ransomlooker tool ?? MGM and Caesars ransomware timeline ?? Android privacy issues ?? Internet from space ??
Cybernews

?? Cybersec & Digital Insider Ed. 12: Ransomlooker tool ?? MGM and Caesars ransomware timeline ?? Android privacy issues ?? Internet from space ??

Welcome back, dear cyber fellows!

Studies show that human error is the root cause of more than 80% of all cyber breaches, whether malicious or unintended. The recent debilitating cyberattacks on casino and resort giants MGM and Caesars are no exception. How can just one employee mishap cost a company millions?

Statistics have shown that nearly 60% of small businesses that suffer a significant breach are forced to shut down within the same year. Furthermore, based on findings from the Ransomlooker tool , 45% of the municipal victims were communities with fewer than 50K residents.

Few more facts about ransomware attacks ??

  • 64% of organizations suffered from a ransomware attack
  • The top 3 attacked industries are Construction, Manufacturing & Industrial, IT Services & IT Consulting
  • 45% of the municipal victims were communities with fewer than 50K residents
  • <60% of respondents believe their company complies with cybersecurity mandates
  • $400 is the approximate cost of a healthcare record on the dark web

Stay secure, stay curious ??

See you in two weeks.

Best regards,

Kristina Jn ; [?? ]

Head of Content Distribution Dept

Cybernews


?? Follow us on LinkedIn:?Cybernews LinkedIn Profile

?? Follow us on X:?Cybernews X Profile

?? Follow us on Facebook:?Cybernews Facebook Profile


Cybernews

Following the news that the number of reported ransomware attacks has doubled since last year, and every single day, at least ten businesses worldwide wake up to a nightmare, Cybernews team introduces a new tool - Ransomlooker, that monitors ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide. It's useful for journalists, cybersecurity experts, and researchers.

Ransomlooker offers real-time updates and actionable insights through continuous scanning and analysis of ransomware activities on the internet. It is user-friendly and accessible to all.

Also, our tool updates information at the same hour as new victims are leaked. It offers various statistical insights into data, the ability to determine attack perpetrators, and incorporates filtering by country, timespan, and other parameters.

It is also free and allows any visitor to access the whole dataset, which is probably the most prominent ransomware threat intelligence market and features data from 2019 right to this very hour.


?? X usage significantly down under Elon Musk - Twitter, now rebranded as X, has seen a sharp decline in global traffic and monthly active users since Elon Musk’s takeover a year ago. His own profile is the only exception to the downward trend.

?? New privacy bill gives Californians ability to “delete” their online data - California Governor Gavin Newsom has inked a new privacy law that will make it easier for CA residents to force shady data brokers to take their personal info off the web – with just the push of a button.

?? Google will protect users in AI copyright accusations, Bard excluded - Google has announced its commitment to the protection of users of generative AI systems within its Cloud and Workspace platforms in cases where they might face allegations of intellectual property infringement. Google’s Bard search tool isn’t included, however.

?? Musk wants to connect your phone to the internet directly from space - Texting, calling, and browsing with a direct phone connection to Musk’s satellites may soon become available after SpaceX’s Starlink launched a new website promoting Direct to Cell capabilities.



?? SCADA: the invisible backbone of modern industry - Supervisory Control and Data Acquisition (SCADA) systems are the proverbial donkeys on whose backs the modern industry rests. Worryingly, targeted SCADA attacks could severely impact the basic utilities that modern life relies upon.

?? Exposed security cameras in Israel and Palestine posing significant risks - Many poorly configured security cameras are exposed to hacktivists in Israel and Palestine, placing the owners using them and the people around them at substantial risk.

?? Hacktivists in Palestine and Israel after SCADA and other industrial control systems - Both pro-Israeli and pro-Palestinian hacktivists have joined the fight in the cyber realm. Industrial control systems (ICS) seem to be one of the most lucrative targets for them, and there are hundreds exposed.


Cybernews

Android financial apps too greedy for permissions - Android apps usually require excessive permissions. But financial apps go a step further into dangerous territory, asking for even more access and posing heightened risks to privacy and security, a Cybernews research team investigation into 50 apps reveals.


?? Titans in crisis: unraveling the MGM and Caesars ransomware timeline - MGM Resorts International and Caesars Entertainment made headlines in Las Vegas, stealing the spotlight in 2023 as the new poster child for corporate ransomware attack victims. How did this incident unfold, who is responsible, and what are the future implications?

?? Fairfax data breach exposes medical records - US healthcare company Fairfax has disclosed a data breach that may have exposed the medical records of up to nearly a quarter of a million patients.

?? LinkedIn smart links leveraged in credential phishing campaign - Attackers are on the hunt for Microsoft Office logins. A recent phishing campaign is leveraging newly created or compromised LinkedIn business accounts.

?? Meta’s Quest 3: return of the glasshole - New social norms and regulations may be required regarding “glassholes” – individuals who wear their augmented reality headsets in public and act irresponsibly. The recent trend, which is going viral on social media, raises both privacy and safety concerns.


Cybernews

I tried to take complete control of all the apps and their permissions on my Android device, but I had to give up. Despite revoking all user-available permissions, apps can still run on startup, stay in the background, have full network access, access sensitive information, and use hardware. So, what can you do? - Cybernews senior journalist Ernestas Naprys shares his findings. Learn more here .

?? Experiment: anti-Pegasus box to keep spies away from my home - Journalists, activists, or minorities around the globe who are targeted by governments using high-tech spyware such as Pegasus have limited means to protect themselves. After recent revelations that ad networks are being utilized for spying and delivering payloads, one helpful solution could be DNS filtering, known as a Pi-Hole. Is it hard to set up, and how useful is it?


DNA Micro Leaks Sensitive Data:

?? Subscribe to us on Youtube:?Cybernews Youtube Profile



要查看或添加评论,请登录

Cybernews的更多文章

社区洞察

其他会员也浏览了