Hacker Group Lazarus Begins Targeting Russian Entities
darkreading.com- Author: Jai Vijayan - Date: February 19th, 2019
North Korea’s Hacker Group, Lazarus, has now begun targeting companies in Russia. This unusual turn of events was discovered by security researchers from Check Point Software Technologies while investigating malicious Microsoft Office documents that appeared to be made specifically for use against Russian entities. Check Point threat intelligence group manager, Lotem Finkelshtein, says the company’s researchers observed three distinct Lazarus Group attacks targeting Russian entities in the last week of January.
Global Cyber Alliance Creates Cybersecurity Toolkit Aimed At Small Businesses
darkreading.com- Author: Curtis Franklin Jr. - Date: February 20th, 2019
Security Researchers at Global Cyber Alliance have developed a new toolkit that aims to give small businesses easier access to better cybersecurity practices. Small businesses face the same threats that larger businesses do but do not have the same resources to invest in having a better cybersecurity infrastructure. GCA’s toolkit is intended to help deliver the already available resources to smaller businesses by providing them in a more digestible format. Senior Vice President for Mastercard’s Cyber Security Coordination and Advocacy, states that “it’s very hard for small businesses to consume that”. He also states that easy to use tools that small businesses can use right now would “significantly reduce their cyber risk so they could be more secure and more economically stable in both the short and long term”.
Human Error Is To Blame For Majority of Insider Threats
darkreading.com- Author: Steve Zurier - Date: February 21st, 2019
CyberSecurity Company, Dtex, conducted assessments to determine what percentage of employees expose proprietary company information on the web. They discovered that in 98% of their assessments employees exposed information - a 20% increase from 2018. They also discovered that nearly two-thirds of insider threats are caused users who are careless with company information or who were accidentally leaking information. The largest threat being from employees who leave the companies they work at with information being on flash drives or other storage mediums.
Report Claims Cybercriminal Extortionists Make An Average of $360,000 a Year From Victims
darkreading.com - Author: Kelly Sheridan - Date: February 21st, 2019
Being a cybercriminal extortionist has never been so lucrative as it is now. Digital Shadows Photon Research Team published a report stating that aspiring extortionists will get paid by their high net-worth targets an average of $360,000 dollars a year. The report in summary explores in depth the different ways cybercriminals prey on their targets. Rafael Amada, senior strategy and research analyst at Digital shadows states that many cyber criminals are getting creative in the ways they extort money from their victims. They use victims’ personal information and/or sensitive data get them the pay up. And in some cases becoming an extortionist yourself has become more accessible with easily available tutorials on the Dark Web. In some cases some experienced attackers sell DoS and ransomeware-as-a-service models to novice hackers looking to get paid.
Crow Steals a Credit Card In Attempt To Purchase Train Ticket
@kinoshi42155049 - Date: May 1st, 2018
Crows have been studied to be some of the most intelligent animals in the world and that’s with no exception with a crow found playing with a train ticket counter in Japan.
In a twitter user’s video, we can see a crow pressing buttons on a train ticket kiosk next to Japanese passengers. Soon after, the crow hops next to a passenger purchasing a ticket with their credit card and grabs the card in its mouth. We then see the crow fiddling with the card and the machine until it gives up and gives the card back to the owner.
Click on the link below to see the video in its entirety.