Skip to main content

Elon Musk Confirms Russian Hackers Attempted to Recruit Tesla Employee

Spooks Called in as Cyberattacks Again Halt Stock Exchange
  Your SecurityWeek Briefing Webcasts
RSS Feed
08.31.20


Monday, August 31, 2020


Event

Threat Intelligence Summit - Virtual Event
Immerse in a virtual world to explore and discuss the latest trends and insights on cyber threat intelligence.

Watch Sessions Now

Now On Demand



It's Not Just an Unusual Login: Why Pay Attention to Threats Facing SaaS and Cloud?
Businesses should be emphasizing visibility, early threat detection, and focusing on understanding ënormalí activity rather than ëbad.í
Read the Full Column
by Justin Fier




Putting the Pieces Together for Extended Detection and Response
Security tools need to integrate with a centralized repository of relevant, prioritized threat intelligence, and with all your security controls.
Read the Full Column
by Marc Solomon




Cybersecurity: An All-Encompassing Organizational Responsibility
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organizationís individual corporate culture.
Read the Full Column
by Matt Morris



NSA and CISA Alert Highlights Urgency for OT Security
Letís learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Read the Full Column
by Galina Antova




Stick With The Plan Until It Not Longer Makes Sense
In security, having a plan is important. That being said, there are times when a given plan may no longer be appropriate or effective.
Read the Full Column
by Joshua Goldfarb





Boom Goes the Cyber Security Toolbox
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
Read the Full Column
by Rafal Los




The Integration Imperative for Security Vendors
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Read the Full Column
by Marc Solomon





Education's Digital Future and the End of Snow Days
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Read the Full Column
by Preston Hogue






Event

Threat Intelligence Summit - Virtual Event
Immerse in a virtual world to explore and discuss the latest trends and insights on cyber threat intelligence.

Watch Sessions Now

Now On Demand




See All Recent Articles at SecurityWeek.Com


Elon Musk Confirms Russian Hackers Attempted to Recruit Tesla Employee: The failed attempt by Russian hackers to recruit an employee to install malware onto an enterprise network was targeting electric car maker Tesla, a tweet from Elon Musk confirms. Read More

Slack Pays Bounty for Critical Vulnerability in Desktop App: A security researcher was awarded a $1,750 bug bounty reward for discovering a remote code execution vulnerability in the Slack desktop applications. Read More

Chinese Researcher Arrested for Destroying Evidence of Data Transfer to China: A Chinese national was arrested in the United States for destroying evidence of possible transfer of sensitive data to China. Read More

Spooks Called in as Cyberattacks Again Halt Stock Exchange: New Zealand's spy agency has been brought in to help fight back against cyberattacks that crippled the country's stock exchange for a fourth straight day on Friday. Read More

France Won't Ban Huawei But Favors European 5G Systems: French President Emmanuel Macron says France is not excluding Chinese telecom giant Huawei from its upcoming 5G telecommunication networks but favors European providers for security reasons. Read More

Attackers Actively Targeting Cisco IOS XR Vulnerability: Cisco over the weekend published information on a vulnerability (CVE-2020-3566) in the IOS XR software that could be exploited to cause a denial of service condition. Read More

Researchers Analyze Traffic Statistics of Popular Cybercrime Forums: Researchers at Digital Shadows have analyzed the traffic statistics of popular cybercrime forums and they have shared some interesting observations. Read More

New Attacks Allow Bypassing EMV Card PIN Verification: Vulnerabilities in the implementation of the payment card EMV standard allow for the mounting of attacks targeting both the cardholder and the merchant. Read More

Former Employee Admits Hacking, Damaging Cisco Systems: A former Cisco employee has pleaded guilty to hacking charges related to him accessing the companyís systems and deleting 16,000 Webex Teams accounts. Read More

Justice Dept: North Korean Hackers Stole Virtual Currency: North Korean hackers stole millions of dollars from virtual currency accounts and then laundered the stolen funds in hopes of making the crime untraceable, according to a Justice Department civil forfeiture complaint filed Thursday. Read More

Iranian Hackers Target Academic Researcher via WhatsApp, LinkedIn: The Iran-linked hacking group known as Charming Kitten recently switched to WhatsApp and LinkedIn to conduct phishing attacks. Read More

North Korean Hackers Are Back at Targeting Banks: Since February 2020, North Korean state-sponsored hackers have been targeting banks in multiple countries, several US agencies warn in a joint advisory. Read More

Walmart Says Teaming With Microsoft in Bid for TikTok: US retail giant Walmart said Thursday it had teamed with Microsoft to buy TikTok, the Chinese-owned short-form video app that has come under fire from the administration of President Donald Trump. Read More

Cisco Patches High-Severity Vulnerabilities in NX-OS Software: Cisco this week released patches for ten high-risk vulnerabilities in NX-OS software, including some that could lead to code execution and privilege escalation. Read More

Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked: Researchers have once again showed that many printers can still be hacked remotely; they hijacked 28,000 devices, but believe roughly half a million are vulnerable to attacks. Read More

Fastly to Acquire Web Application Security Firm Signal Sciences for $775 Million: Content delivery network (CDN) provider Fastly (NYSE: FSLY) has agreed to acquire web application security firm Signal Sciences for approximately $775 million in cash and stock. Read More

Microsoft Warns of New 'Anubis' Info-Stealer Distributed in the Wild: Microsoft warns that a new info-stealer malware named Anubis is now actively distributed in the wild. Read More





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2020 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...