Web

Twitter accounts belonging to media organizations and prominent personalities (like tennis great Boris Becker) were hacked and hijacked, displaying pro Turkish messages accusing Dutch and German officials of Nazi sympathies. (Image courtesy of Twitter.)

Twitter Hack is latest to underscore Third Party App Risk

In-brief: security experts are warning about the threat posed by third-party applications that tap into prominent social media platforms like Twitter after accounts belonging to media organizations and prominent personalities were hacked and hijacked to display messages accusing Dutch and German officials of Nazi sympathies. 

The New York Times expose on the hacks of the DNC is a case study in how not to respond to a cyber attack. We talk with Tim Bandos of Digital Guardian about building a cyber threat hunting capability.

Don’t Be The DNC: An Introduction to Enterprise Threat Hunting

In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune. 

Hardware and software from the Chinese supplier XiongMai Technologies were exploited to create the massive Mirai botnet, according to an analysis by the firm Flashpoint. (Image courtesy of Shodan)

Shoddy Supply Chain Lurks Behind Mirai Botnet

In-brief: A common, China-based supplier of management software is the common thread that ties together the myriad digital video recorders, IP-based cameras and other devices that make up the Mirai botnet, according to analysis by the firm Flashpoint. 

A Year Later, Clearly “Blackhat SEO” is still Working

A Year Later, Clearly “Blackhat SEO” is still Working

In-brief: Akamai lead researcher Or Katz shares longitudinal data showing that blackhat SEO campaigns designed to improve the ranking of web sites that collect cheating and marital infidelity stories have worked.

Two U.S. Senators are requesting information about the government's experience with ransomware - asking whether Uncle Sam has paid ransoms to get data back.

Updated: Vulnerability on 3m Systems Could Spread Ransomware To Schools

In-brief: Researchers at Cisco Systems said that they had identified more than 3 million “at risk” application servers running a vulnerable component that has been linked to ransomware infections. More than 1,600 of those systems have already been compromised, including many school libraries. Updated to add comment from Follett Corp. PFR 4/18/2016