Infosecurity – Cryptojacking doesn’t destroy data. Instead, it chews up computing resources. Danny Bradbury asks whether criminals have finally found a largely victimless crime
Article Categories: ARTICLE
China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms
Dark Reading – Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says.
An advanced persistent threat group that is believed to be operating out of China is conducting a wide-ranging cyber espionage campaign targeting satellite, telecommunications, and defense organizations mostly in Southeast Asia and the United States.
Imperva Claims About Auth0 Are Misleading At Best
Stop the presses.
Forbes – A blog post from Imperva filed under “Research” makes the breathless claim that the author was able to impersonate someone else and execute a cross-site scripting phishing scam by exploiting flaws in the Auth0 identity-as-a-service platform.
Are Smart Cities a Smart Choice?
New Indian Express – Centralizing surveillance, utilities and other essential services can potentially do more harm than good.
Phishing Attacks with Auth0? Facts First
Auth0 Blog – A security researcher claimed that an attacker could perpetrate a phishing scam that could target a company using the Auth0 platform based on domain. Learn about this attack, the prevalence of phishing in the industry, and how to mitigate these scams.
Hackers Can Hijack, Sink Ships: Researchers
SecurityWeek – Insecure configurations and vulnerabilities in communications and navigation systems can allow hackers to remotely track, hijack and sink ships, according to researchers at penetration testing and cybersecurity firm Pen Test Partners.
Researcher Hacked In-Flight Airplanes From the Ground
24/7 Wall St. – In what may be the last thing you want to hear about today, a security researcher claims that he was able to hack into Wi-Fi networks and satellite communications (satcom) on in-flight airplanes from a position safely on the ground. Four years ago the same researcher discovered critical flaws in satcom systems that allowed attackers to invade and disrupt communications links to airplanes, ships and military operations, among other networks.
Researcher Succesfully Hacked In-Flight Airplanes – From the Ground
IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be ‘weaponized.’
Dark Reading – It’s been four years since researcher Ruben Santamarta rocked the security world with his chilling discovery of major vulnerabilities in satellite equipment that could be abused to hijack and disrupt communications links to airplanes, ships, military operations, and industrial facilities.
Building Apps for the Finance Industry: Benefits and Challenges
Medium – MSLDev – The finance industry cannot afford to live in the past — one mired in poor customer perceptions, fewer user-centric processes and digital channels, legacy systems, and a slow response to an ever-changing technological landscape. The industry must adapt and adopt best practices in the delivery of its service in order to meet customer needs swiftly, conveniently, and on-demand, as well as become pioneers of innovation.
Do’s and Don’ts for Protecting Your Cobots’ Cybersecurity
Blog Robotiq – Collaborative robots – more commonly known as cobots – work near people and help human employees get more done. If one or more cobots malfunctions due to a cybersecurity attack, the consequences could be dangerous and costly.
Fortunately, companies can take action to keep their cobots secure and working as expected.
