attack

Home/Tag: attack

Bad Rabbit Did a Bad Bad Thing

New Ransomware Bad Rabbit is Wreaking Havoc Bottom Line Up Front: Preparation is your best friend to defend against Ransomware – get a backup system now for your company’s network and your personal computer On October 24th, the U.S. Computer Emergency Readiness Team announced reports of a new ransomware infecting computers around the world. This attack is the third major international ransomware campaign in 2017 alone, with NotPetya and WannaCry preceding it. These fittingly ominous names represent the widespread damage [...]

China Is Cutting the Legs Out from Under American Businesses (but please don’t stop them?)

Businesses and their executives everywhere should be aware of this story run by 60 Minutes on Jan 17, and the blog Jeff Lipson wrote about here. The fact that China is stealing U.S. companies’ intellectual property is not news. The fact that President Obama worked with the Western District of Pennsylvania to indict five Chinese officers of theft of intellectual property is not news. So, what is the real news bite here? Some companies and Americans want to fight back and stop [...]

Protecting Philadelphia Companies from Chinese Hacking – Part 1

Last night, 60 Minutes ran a segment on China’s massive theft of intellectual property from US businesses.  http://www.cbsnews.com/news/60-minutes-great-brain-robbery-china-cyber-espionage/ The episode highlighted that the Chinese government is using its military and intelligence services to give its companies an edge over US business, by stealing our trade secrets.   My Team and I spent a number of years working at US Cyber Command and the National Security Agency. We saw first hand just how prolific this theft was.  I’ve spoken numerous times [...]

This Ain’t Your Daddy’s Phishing Trip

One thing we've likely all gotten, is an email from some "rich Nigerian prince" offering us millions, in exchange for a little legwork or some such activity. The scam is old, but surprisingly effective. You wire them what seems like a pittance, for what you expect will be a major financial windfall on the return. Except that the phisher isn't a prince and doesn't have millions. But, they do have that untraceable money order you just sent them. That was [...]

Could IPv6 Be A Boon For DDoS Attackers?

In my eyes, IPv6 is today what VoIP was in the early 2000's-that is, a protocol which, while it carries great promise, takes forever to gain critical mass. I recall many years where vendors would declare that "this was the year VoIP breaks out", only to hear it again from them a year later. IPv6 has been around for quite some time-I myself worked on government agency projects to make them IPv6 compliant back in 2009, and even today, IPv6 [...]

Serious iOS messaging bug can crash your iPhone

Everyone who uses an Apple device should be on the lookout for a new threat that can crash/reboot your device.  Users of Apple’s desktop and mobile operating systems are experiencing crashing computers, phones, and tablets across the internet.  This is caused by a bug in Apple's rendering engine of Arabic text when a message gets shortened. The text that will cause this can be seen in the image below: By the time you’ve received the malicious text, it’s probably too late. [...]

Another High Profile Healthcare Breach

The NY Times recently published a story that yet another major health insurance provider-this time CareFirst, serving the Washington, DC area-had been breached. The attack exposes possibly as many as 1.1 million patients, though the company offers up that things like Social Security numbers and other sensitive financial data did not appear to be grabbed during the attack. That fact may be little comfort to someone who did have their name, e-mail and birthday compromised-it's enough to be annoying, that's [...]

Cyber Breaches: Four Different Expert Perspectives

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant kat.jimenez@layer8cybersecurity.com May 15, 2015  Exton, Pennsylvania – The Greater Philadelphia Alliance for Capital & Technology (PACT) hosted How will you respond to a Cyber Attack: Observe Incident Response Plans in Action, the final cybersecurity seminar in a three part series, featuring Broadpath PR, Cozen O'Connor, Layer 8 Security, and Morris Risk Management on May 7, 2015 at the Philadelphia Marriott West. One of the panel members, Kevin Hyde, from Layer 8 Security, reflected [...]

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time come across someone actually doing things for fun, the breaches are now, more than ever before, about finding holes, exploiting vulnerabilities and...cashing in. Hackers are [...]

Denial Of Service…or Distraction?

It used to be that, when you heard someone was suffering from a DDoS attack, they were being bombarded with an amazing amount of traffic and sessions, effectively crashing the site for any legitimate traffic. Things tend to evolve over time. The same is apparently holding true for the denial of service attacks. As noted in a recent study, new DDoS attacks are trending towards shorter spans of time, tying up less than the typical amount of bandwidth (http://www.fierceitsecurity.com/story/companies-are-being-koed-after-ddos-jabs/2015-03-24). In [...]