Recent Cyber Attacks & News

Cyber-attacks can happen to any business and its not just large corporations that can suffer from data breaches. Small organizations are at an increased risk with limited resources as cyber attack can lead to data losses easily. However, the largest of corporations in the world have fallen prey to cyber attacks. Below you will find the most recent information about cyber security and attacks. This page will automatically update to ensure you can always see the most recent cyber attack information.

Bookmark this page

  • Devops biz Chef roasted for tech contract with family-separating US immigration, forks up attempt to quash protest
    Software house hits nuclear option after popular Ruby code yanked for moral reasons Devops darling Chef had a nightmare Thursday after it emerged the software biz had inked a deal with US immigration, which sparked protest and a baffling counter-response.…
    Source: The RegisterPublished on 2019-09-20
  • Exploding super-prang asteroid to pepper Earth, trigger deadly ice age – no, wait, it happened 466 million years ago
    Aww, shucks. Cancel the End of the World party A huge collision in the Solar System’s asteroid belt may have triggered an ice age on Earth that froze our planet... some 466 million years ago.…
    Source: The RegisterPublished on 2019-09-20
  • Nice work if you can grift it: Two blokes accused of swindling $10m from the elderly with bogus virus infection alerts
    ~~~WaRNiG!! Ur PC has THe Da Vinci m4Lw4rez!! CaLL 1-555-NOSCAM 2 f!x it~~~ Two Americans used bogus virus-infection alerts to bilk $10m out of PC owners, it is alleged.…
    Source: The Register – SecurityPublished on 2019-09-20
  • Nice work if you can grift it: Two blokes accused of swindling $10m from the elderly with bogus virus infection alerts
    ~~~WaRNiG!! Ur PC has THe Da Vinci m4Lw4rez!! CaLL 1-555-NOSCAM 2 f!x it~~~ Two Americans used bogus virus-infection alerts to bilk $10m out of PC owners, it is alleged.…
    Source: The RegisterPublished on 2019-09-20
  • How business e-mail compromise can cost millions
    Generally, hijacked accounts are used to distribute spam and bypass filters. However, a hijacked mailbox can be used for far nastier things, such as a business e-mail compromise (BEC) attack. Last month, a subsidiary of Toyota Boshoku Corporation was hit by such a scam, causing an estimated 4 billion yen (more than $37 million) of damage. What happened? According to the company’s official statement of September 6, as well as comments from news publications, unknown cybercriminals launched a BEC attack. The incident is still being investigated and no details have been released, so it is not clear whether a hijacked mailbox was used or if the attackers simply impersonated someone. What we do know is that the financial loss was attributed to fraudulent bank transfer instructions that someone in the company took for legitimate. Shortly after the transfer, Toyota security experts realized that the money had gone to outside accounts, but it was too late to stop the transfer. Meanwhile, the company is working to get the funds returned. What is a BEC attack? A BEC attack does not necessarily involve hijacking other people’s mailboxes. Sometimes cybercriminals try to impersonate senior company employees or partners using third-party addresses. However, using an insider’s mail account makes the attack a whole lot easier — after all, an e-mail from someone you really do correspond with raises far less suspicion. For the attack to be successful, the cybercriminal must of course have excellent social-engineering skills; impersonating another person and convincing someone to do something is not so easy. Here again, a hijacked mailbox simplifies the attackers’ task; having studied the contents of the Inbox and Sent folders, they will be able to imitate the person’s style and character much more convincingly. The goal of a BEC attack is not always the transfer of funds (convincing someone to send millions of dollars is not a trivial task in anyone’s book). It is far more common for attackers to try to extract confidential data from the victim. Other examples of BEC attacks The Toyota attack is by no means the first case of this kind. This year, we wrote several times about a cybercriminal scheme aimed at seizing the accounts of company employees. In May we chronicled how cybercriminals tricked a football club into using the wrong payment details for a player’s transfer fee. Last month, scammers tried to phish $2.9 million out of Portland Public Schools (Oregon). And in July, Cabarrus County Schools (North Carolina) lost $1.7 million, having received bogus instructions by e-mail. Staff initially transferred $2.5 million, supposedly for the construction of a new school, but later recouped part of the funds. How to avoid becoming a victim To safeguard against social engineering, technical means alone are inadequate — especially if the attackers are professionals with access to the real mailbox of the person they are trying to impersonate. Therefore, to avoid falling for this kind of scam, we advise that you: • Clearly set out the company’s funds transfer procedure
    Source: Kaspersky Lab official blogPublished on 2019-09-20
  • Open-source companies gather to gripe: Cloud giants sell our code as a service – and we get the square root of nothing
    Biz bods head to Open Core Summit to ponder how to, you know, get paid Analysis On Thursday, at the Palace of Fine Arts in San Francisco, companies building open-source code gathered to figure out how to survive having Amazon, Google, and Microsoft sell their software as a service without paying for the privilege.…
    Source: The RegisterPublished on 2019-09-20
  • If you’re using Harbor as your container registry, bear in mind it can be hijacked with has_admin_role = True
    Patch now before miscreants sail off with your apps, data Video IT departments using the Harbor container registry will want to update the software ASAP, following Thursday's disclosure of a bug that can be exploited by users to gain administrator privileges.…
    Source: The RegisterPublished on 2019-09-19
  • If you’re using Harbor as your container registry, bear in mind it can be hijacked with has_admin_role = True
    Patch now before miscreants sail off with your apps, data Video  IT departments using the Harbor container registry will want to update the software ASAP, following Thursday's disclosure of a bug that can be exploited by users to gain administrator privileges.…
    Source: The Register – SecurityPublished on 2019-09-19
  • Google removes two Chrome ad blocker extensions caught ‘cookie stuffing’
    Two Chrome ad blockers caught manipulating cookies so extension devs could earn commissions on users' backs.
    Source: ZDNet | security RSSPublished on 2019-09-19
  • Facebook campus death plunge: Cops say man jumped from 4th floor in apparent suicide
    Foul play ruled out at Menlo Park headquarters A Facebook employee died at the tech giant's Silicon Valley headquarters today in an apparent suicide.…
    Source: The RegisterPublished on 2019-09-19

Why Trust Us

For most organisations and companies these days, maintaining a high level of cyber security couldn’t be more important. Not only is it key to protect customers and users’ personal and financial information.

Get a Quote

Click below and we’ll send you a quote as soon as possible.

quote-form-pattern
  • This field is for validation purposes and should be left unchanged.

Contact Us

Click below and we’ll send you a quote as soon as possible.

quote-form-pattern
  • This field is for validation purposes and should be left unchanged.

Step 1 of 4 - Let’s get started

25%
  • Thanks for your interest in working with us. Please complete the details below and we’ll get back to you as soon as possible.
Close ×
price-popup-pattern
Close ×
price-popup-pattern
Close ×

Step 1 of 3

33%
  • Cyber Essentials Basic Pass Guarantee - £750

    Your Details

price-popup-pattern
Close ×

Step 1 of 3

33%
  • Cyber Essentials Basic Pay Monthly - £79 pcm

    Your Details

price-popup-pattern
Close ×

Step 1 of 2

50%
  • Cyber Essentials Plus - Get a Quote

    Your Details

price-popup-pattern
Close ×

Get In Touch

  • This field is for validation purposes and should be left unchanged.
price-popup-pattern
Close ×

Get A Quote

  • This field is for validation purposes and should be left unchanged.
price-popup-pattern
Close ×
price-popup-pattern

Buy Cyber Essentials

price-popup-pattern