Don't Answer the Phone: Inside a Real-Life Vishing Attack
Source: Dark Reading
Successful attackers focus on the psychological manipulation of human emotions, which is why anyone, even a tech-savvy person, can become a victim.
It started with a phone call around 10:30 a.m. on a Tuesday from an unknown mobile number. I was working on my computer at home and usually don't answer phone calls from people I don't know. For some reason, I decided to stop what I was doing and take that call.
Email Bomb Attacks: Filling Up Inboxes and Servers Near You
Source: Data Breach Today
Imagine a hospital's email system suddenly filled with thousands of spam messages sent by bots. The unexpected traffic degrades network server performance, and the IT administrator is flooded with service requests from users. The hospital is clearly under a cyberattack, but what do the attackers hope to accomplish?
Feds Form Water Cyber Task Force Following Volt Typhoon Hacks
Source: MeriTalk
Following the discovery of a Chinese-based hacking group compromising U.S. critical infrastructure, the White House – in collaboration with the Environmental Protection Agency (EPA) – announced plans this week to form a Water Sector Cybersecurity Task Force.
New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems
Source: The Hacker News
A novel denial-of-service (DoS) attack vector has been found to target application-layer protocols based on User Datagram Protocol (UDP), putting hundreds of thousands of hosts likely at risk. Called Loop DoS attacks, the approach pairs "servers of these protocols in such a way that they communicate with each other indefinitely," researchers from the CISPA Helmholtz-Center for Information Security said.
Tracker Backtrack? Feds Revise HIPAA Guidance on Web Tools
Source: Data Breach Today
Federal regulators have issued updated guidance about web trackers on patient portals or other health-related websites, saying that collecting and disclosing certain information - such as device IP addresses - does not necessarily pose HIPAA violations under some circumstances.
Commentaires