Original research from CybelAngel takes a look at how cybercriminals plan healthcare-related fraud, ransomware and other attacks by obtaining stolen credentials, leaked database files and other materials from specialized sources in the cybercrime underground.
The Cybersecurity and Infrastructure Security Agency (CISA) and AVANGRID, a sustainable energy company providing services in 24 states, conducted a virtual tabletop exercise to test and identify the safety procedures AVANGRID has implemented since the beginning of the COVID-19 pandemic and identify additional procedures necessary to ensure employee safety operations and business continuity in the out years.
Two large phishing attacks, aimed at a combined 10,000 victims, spoofed emails from FedEx and DHL Express in an attempt to steal their targets' business email account credentials.
The Phoenix Suns Arena will install 26 X-ray inspection systems, adding a new layer of protection to attendees against potential threats such as weapons and explosives. It also will help intercept other prohibited items, and reduce hands-on searches.
New Lookout Threat Report: 70% of government-focused mobile phishing attacks sought to steal credentials in 2020.
February 24, 2021
Lookout Inc. released its Government Threat Report, which examines the most prominent mobile threats affecting federal, state and local governments in the United States. Lookout data reveals that U.S. government organizations are increasingly targeted by credential stealing mobile attacks and exposed to hundreds of vulnerabilities from outdated operating systems and risky apps.
Audio-based social app Clubhouse has allegedly suffered a data breach, as a third-party developer designed an open-source app that allowed Android smartphone users to access the invite-only, iPhone-only service. The app, which launched in March 2020, has quickly gained popularity, raising $100 million in funding in January.
Digital Shadows highlighted the growing role of Initial Access Brokers within the criminal ecosystem within its Initial Access Brokers Report. Rather than infiltrating an organization deeply, this type of threat actor operates as a ‘middleman’ by breaching as many companies as possible and goes on to sell access to the highest bidder – often to ransomware groups.
Potawatomi Hotel & Casino, a 500-room luxury hotel located in Milwaukee, has implemented a touchless security screening for guests that includes temperature screening and weapons detection screening without needing guests to walk through individually as is the case with traditional screening methods.
Burlington International Airport (BTV) in Vermont has received a $14.5 million federal grant to expand the Airport’s terminal building and consolidate the two existing security checkpoints into one.