By Eric Corcoran, Posted in Technology Week in Review

Monday 4/15 CyberArk Named Top Security Solution for Government Agencies CyberArk is recognized as the premier cybersecurity solution for government agencies and organizations to protect against the exploitation of privileged accounts, credentials and secrets across every environment – including on the endpoint and across on-premises, hybrid cloud and DevOps environments. ‘Exodus’ spyware posed as a legit iOS app Once installed, Exodus could access photos, videos... read more.

  • April 19, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/8 This prolific phishing gang is back with new tactics to target executives A prolific cyber-criminal phishing operation which built a list of 50,000 executives, CFOs and other top financial personnel has expanded its operations with a new database of additional targets. The Business Email Compromise (BEC) group dubbed London Blue distributes phishing emails in an effort to trick organisations into transferring large sums of money into their accounts, often while posing as executives and oth... read more.

  • April 12, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 4/1 Malware may have stolen 2 million US restaurant diners’ credit card details That malware could have stolen card numbers, expiration dates and cardholder names from people who used them at Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy, Mixology and Tequila Taqueria between May 23, 2018, and March 18, 2019. Toyota announces second security breach in the last five weeks Toyota said the servers that hackers accessed stored sales information on up to... read more.

  • April 05, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/25 FEMA ‘major privacy incident’ reveals data from 2.5 million disaster survivors The data mishap, discovered recently and the subject of a report by the Department of Homeland Security’s Office of Inspector General, occurred when the agency shared sensitive, personally identifiable information of disaster survivors who used FEMA’S Transitional Sheltering Assistance program, according to officials at FEMA. Those affected included the victims of California wildfires in 2017... read more.

  • March 29, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/18 Spam Campaign Uses Recent Boeing 737 Max Crashes to Push Malware The email goes on to discuss how the Berlinger persona found a document leaked on the dark web. This file purports to identify several companies that will suffer similar crashes involving Boeing 737 Max aircraft in the future. Under the guise of helping them protect their loved ones, Berlinger asks users to view the document by opening an attached JAR file named “MP4_142019.jar.” This New... read more.

  • March 22, 2019

By Ken Phelan, Posted in Security

I’m fresh back from RSA this week, which means that in the last 10 days I’ve seen approximately one billion new cyber security applications. Many of them make claims regarding AI and its value to their platform. It’s my job to make some judgement about the reality of that claim. Here’s what’s going on in the back of my head when someone tells me about their great AI. First of all, when people talk about AI in this context, what they generally mean is machine learning. Machine... read more.

  • March 20, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 3/11 Windows malware: Slub taps Slack, GitHub to steal your info The malware also exploits an even older Windows bug, CVE-2015-1705, a win32k.sys local elevation of privilege flaw that was found to be useful by targeted attackers because it could be used to bypass a Windows application's sandbox. Once a machine has been fully compromised, the backdoor uses a private Slack channel to check commands taken from 'gist' snippets hosted on GitHub, and then sends the commands to a private Slack channel co... read more.

  • March 15, 2019

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 3/5 Attack Campaign Targets Organizations Worldwide with New Qbot Banking Malware Variant The campaign consists of phishing emails that come with an attached ZIP file using a .doc.vbs extension. Upon execution, the VBS script extracts information about the target machine’s operating system and attempts to check for strings associated with well-known antivirus software. It then uses the BITSAdmin tool to run a malware loader. Ivanti Brings Together Leading Patch Manag... read more.

  • March 08, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/25 Phishing campaign attempts to spread a new brand of snooping malware A series of spear-phishing attacks using fake emails with malicious attachments attempts to deliver a new family of malware, which researchers at Palo Alto Networks have identified and dubbed BabyShark. The campaign started in November and remained active at least into the new year. Cisco HyperFlex Software Command Injection Vulnerability A vulnerability in the cluster service manager of Cisco HyperF... read more.

  • March 05, 2019

By Tom Stanley, Posted in Infrastructure

Splunk allows the transformation of dashboards into forms, which present controls for users to enter search criteria. This allows you to have text boxes, pulldown lists, checkboxes, radio buttons, and other controls at the top of the form. The user’s selections from these input controls are stored in tokens that you can use in your queries or to control various aspects of the form. You can also add these input controls to specific panels on your form, not just at the top of the page. This makes it... read more.

  • March 01, 2019