now browsing by tag


Local #company’s #system #hacked; employee #info #stolen

Source: National Cyber Security – Produced By Gregory Evans

 Green Bay Police say they are investigating the hacking of a local corporation’s computer network, resulting in the theft of “significant amounts of money” from victims in the organization.

Police did not immediately identify the company that was attacked. Action 2 News will work to find that out.

Officers say the hackers stole human resources information.

“In this case, it appeared the cyber actors utilized a known vulnerability to access the company’s computer systems and human resources software to steal personal identifying information from employees,” reads a statement from Capt. Jeremy Muraski.

Police say the vulnerability was a known issue and a security patch had not been installed and updated.

“This incident demonstrates how vital it is to maintain public facing computer systems with the latest security patches from the server companies as cyber actors will attempt to use exploits as long as they are finding vulnerable systems,” reads the statement from Capt. Muraski.

The post Local #company's #system #hacked; employee #info #stolen appeared first on National Cyber Security .

View full post on National Cyber Security

Cyber Security / Info Assurance Engineer

Source: National Cyber Security News

Exeter Government Services LLC – Fort Knox, KY

Fort Knox Cybersecurity Analysts/Engineers (Multiple Positions)

Exeter is seeking multiple Cybersecurity Analysts and Engineers to support the U.S. Army at Fort Knox, Kentucky. Multiple permanent positions are available at all experience levels, from Entry to Senior level on a multi-year contract. Paid relocation to Fort Knox is not available; candidates must be local or willing to relocate at their own expense. Infrequent travel (less than 10%) may be required.

Key duties of the positions include (each position covers a subset of these duties):

Support Command Cyber Readiness Inspections (CCRI) and Risk Management Framework (RMF) mission sets.
Develop and sustain RMF Certification and Accreditation (C&A) packages to maintain Authorization to Operate (ATO)
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS) portal
Process and submit Plans of Action and Milestones (POA&Ms)
Support IT Incident Response (IR) actions and reporting
Track reporting and processing of Cybersecurity Tasking Orders, Warning Orders and Operation Orders.
Provide packages, templates and guidance to gain approved Army Certificates of Networthiness (CoN) for new or upgraded software
Write/develop System Security Plans (SSP) and Tenant Security Plans (TSP)
Whitelists, Blacklists, BOGON, and other Access Control List (ACL) validation and management
Support Cybersecurity IT internal and embedded inspection teams.

Read More….


View full post on National Cyber Security Ventures

Duke #Energy #Vendor’s #Hack May Mean #Stolen Customer #Bank Info

Nearly 375,000 Duke Energy Corp. customers may have had personal and banking information stolen in a data breach.

The country’s largest electric company said Tuesday the customers paid a bill by check or cash at 550 walk-in payment processing centers in the Carolinas, Florida, Indiana, Ohio and Kentucky since 2008.

Those payments were processed by TIO Networks, which was hacked in an attack disclosed after the company was purchased in July by PayPal Holdings Inc. Duke Energy customers make up nearly a quarter of the 1.6 million TIO Network customers potentially compromised.

The personally identifiable information that may have been stolen from Duke Energy customers includes names, addresses, electricity account numbers and banking information if a customer paid power bills by check.

TIO Networks is sending letters to notify those affected.

View full post on National Cyber Security Ventures

How #New Jersey #fills the #cyber info #gap

Source: National Cyber Security – Produced By Gregory Evans

When it comes to sharing information on cybersecurity threats and incident reporting, it’s harder for small businesses to get access to the same intelligence that industry giants share internally and with the Department of Homeland Security.  To address that need, the New Jersey Cybersecurity & Communications Integration Cell was established in 2015 to give the small business community access to unclassified reports and threat profile information.

“The majority of our small- to medium-size businesses do not have a conduit to the federal government or intelligence agencies for information sharing,” New Jersey CTO Dave Weinstein said at the Nov. 15 Capital Cybersecurity Summit.  “They are our primary audience,” along with New Jersey’s main utility providers, he said.

The NJCCIC works to strengthen relationships with the business community “beyond the traditional channels,” which typically don’t provide timely information to smaller firms.  For example, large telecommunications companies like Verizon share information on threats weekly,  Weinstein said, but they don’t make the information available to wider business community.

Over the past 17 months, the cell has published briefs on denial-of-service attacks, ransomware and web application vulnerabilities, along with recommendations for next steps.

Weekly bulletins contain information on threats and malicious activity targeting networks in New Jersey.  Relevant threat alerts and data breach notifications are also sent out via email blasts.

Threat profiles on the NJCCIC website give businesses information on known Android and iOS malware, botnets, exploit kits, point-of-service malware, ransomware and Trojan variants.

States fusion centers are required to share information with the DHS’ National Cybersecurity and Communications Integration Center, but Weinstein said his hope is for other states to adopt New Jersey’s model to share information with their local business communities as well.

As the head of the New Jersey Office of Information Technology, Weinstein is responsible for monitoring networks at 1,400 locations across the state. But his goal is to bring even more “hyperlocal and non-vertically aligned institutions” into the state’s information sharing hub.

“We digest a lot of information on threats on a daily basis that can serve as a valuable collection apparatus for New Jersey, small businesses and the federal government in some cases,” Weinstein said.  “We need to multiply this model across states and other common areas of interest … to standardize the form in which the data is shared.”

The NJCCIC is in the process of exploring how machine learning can help to share actionable cyber threat information.

“Some of those [information sharing] efforts are currently automated, and others are manually intensive,” Weinstein told GCN after the panel.  By eliminating some of “noise” in the cyber threat information, he said, we can “bring it down into something that can actually be analyzed and made sense of.”

The post How #New Jersey #fills the #cyber info #gap appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hacker Holds #University for #Ransom, #Threatens to Dump #Student Info

Source: National Cyber Security – Produced By Gregory Evans

Hacker Holds #University for #Ransom, #Threatens to Dump #Student Info

A hacker is trying to extort a Canadian university, threatening to dump student information unless university top brass pay 30,000 CAD (23,000 USD).

The extortion attempt’s victim is the University of Fraser Valley (UFV), a Canadian university located in the town of Abbotsford, south-east of Vancouver.

Based on the currently available information, a hacker or hacker group breached the university’s network from where it gathered information such as names, email addresses, phone numbers, physical addresses, grades information, some instances, limited financial details, and possibly more.

Hacker circulated personal data of 29 UFV students

The time of the intrusion is unknown, but over the last weekend, the hacker sent an email to UFV students with the personal information of 29 UVF students.

The same email also contained a ransom demand of 30,000 CAD (23,000 USD). The hacker gave UFV officials 48 hours to pay, or he’d release more info.

The University came clean on Monday and admitted the breach in series of four security alerts sent over the course of the week.

“The students directly affected have been contacted and UFV is working with them to take steps to secure their privacy and personal information,” a UFV spokesperson said.

University shuts down email system

On Wednesday, UFV shut down its email system until November 6, in an attempt to prevent the proliferation of other emails containing data of other students.

The hacker’s point of entry and the number of compromised systems are currently unknown. The University is still investigating the breach, together with Abbotsford police.

The deadline has passed, but it’s unclear if the University paid the ransom demand.

In mid-September, a hacker group known as TheDarkOverlord (TDO) tried to extort schools in the US state of Montana. The hacker’s extortion attempts failed, even after he made bomb threats against the school and physical violence against students.

Bleeping Computer reached out to the hacker group through an intermediary and TDO denied it was behind this recent extortion attempt.

The post Hacker Holds #University for #Ransom, #Threatens to Dump #Student Info appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Fight #cyber threats by understanding why #hackers want your info

Source: National Cyber Security – Produced By Gregory Evans

Fight #cyber threats by understanding why #hackers want your info

 Understanding what intruders want is the first step in planning to prevent cyber threats from exploiting business and organization online operations, said panelists Thursday at the 2017 Wyoming Broadband Summit.

Experts in dealing with cyber security threats in Wyoming presented their views as members of a panel on “Cybersecurity – Investing, Growing, Planning and Understanding.” Panelists said not all cyber attackers were looking for the same information.

For a hospital, it might be personal information tied to treatments; for a business, it could be transactions that are needed to keep that business running; for an individual, it may be credit card or bank account access.

“You have to understand what data you have that they want,” said Sean Sanchez, of Optiv Solutions, a cybersecurity firm.

Phishing scams are the most common cybersecurity threats facing enterprise, panelists said. Lack of a cybersecurity plan, or not following one, was another problem.

James Drever, a regional director for the Wyoming Small Business Development Center, said bad password management was a problem he often finds when helping clients with less than 50 employees that have suffered a cyber-attack.

“It’s common for people to use the same password everywhere,” Drever said. “I’ll have them check a website called to find out if their email password has been ‘owned.’ Most of the time I can go to that website and find that they’ve been owned. And those are just the ones we know about.”

Failure to have an adequate back up system is another common issue for small businesses, he said. Backing up data is essential to recovering from a cyber-attack or even a fire that may destroy a business. But that backup can’t be on the same premises as the business. If not using a cloud-based backup, then use an external drive but take the business drive home and take your home backup drive to work after updating.

Robert Pettigrew, director of Information Services/Clinical Engineering for the Wyoming Medical Center in Casper, outlined how a cyber security plan helped the hospital work through the aftermath of an email phishing scam that only hit two computers but left the system down for 10 minutes. Security protocols helped prevent the spread of invasive software, but it was discovered that information connected to 2,000 patients might have been compromised. That triggered a federal review of the hospital’s cyber security operations, but thanks to a management and recovery plan that it was in place, the hospital was cleared of any violations. It still cost the hospital several hundred thousand dollars over a couple of years to satisfy federal reviewers.

Because of the phishing scam, Pettigrew said the hospital convinced employees to use two-factor authentication for their email accounts to reduce the possible of a repeat incident. Cyber security training has also been stepped up.

Sanchez and Mike Borowczak, University of Wyoming Cybersecurity Education and Research director, said researchers at higher educational Institutions can be reluctant to place security protocols on their research because it slows down work.

“The federal government is requiring cyber security protocols as part of grants,” Borowczak said.

Asked by moderator Dave Ritz, U.S. Department of Homeland Security in Cheyenne, what the federal government could to help improve response to cyber threats, the panelists responded that more timely information would help.

“Vulnerability and exploit information should be shared faster,” Sanchez said

Ritz agreed, but said that national security considerations and bureaucracy can slow down the information flow.

The post Fight #cyber threats by understanding why #hackers want your info appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Free Wi-Fi has driven 88% of Canadians to put their personal info at risk

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans A strong Wi-Fi signal is one major factor that helps Canadians decide where they want to stay when they go away for long weekends, said a risk report released by Norton last month. And while a hefty majority of Canadians believe their information is safe while […] View full post on | Can You Be Hacked?

New cybersecurity center at UD to explore protecting health info

Source: National Cyber Security – Produced By Gregory Evans

New cybersecurity center at UD to explore protecting health info

Health information is now one of the most sought-after online records pursued in cyber attacks and that’s one of the reasons behind a partnership to create the Center for Cybersecurity & Data Intelligence at the University of Dayton.
Premier Health,

The post New cybersecurity center at UD to explore protecting health info appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Reporter Sues FBI & CIA for Info on Russian Hacking

Source: National Cyber Security – Produced By Gregory Evans

Reporter Sues FBI & CIA for Info on Russian Hacking

WASHINGTON (CN) — The FBI and CIA blew off a reporter’s request to fast-track his FOIA demand for intelligence agencies’ communications with members of the Electoral College about Russian interference with the recent presidential election, the reporter claims in court.

The post Reporter Sues FBI & CIA for Info on Russian Hacking appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

US starts asking foreign travelers for their social media info

Source: National Cyber Security – Produced By Gregory Evans

US starts asking foreign travelers for their social media info

Foreigners visiting the US under the visa waiver program will find a new question asking for their social media info in the travel authorization they have to fill out. It reads “Please enter information associated with your online presence,” along

The post US starts asking foreign travelers for their social media info appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures