Search Results for “Independent”


September 7, 2019
Deutsche Welle

Deutsche Welle  
Wikipedia Downed by ‘Massive and Widespread’ DDoS Attack in Europe, UK and Parts of the Middle East

Wikipedia users in Europe and the UK and a number of places in the Middle East were unable to access the site yesterday after it fell victim to a “massive and widespread” denial-of-service (DDoS) attack. The website reappeared shortly before midnight but went offline again early this morning. Wikipedia announced that it is experiencing intermittent outages and is working to restore access.

Related: NDTV.com, RAPPLER, Channel News Asia, Reddit-hacking, The Independent, CCN, Haaretz, NDTV,BetaNews, Gizmodo, Slashdot, TechCrunch, Security – ComputingGBHackers On Security, The Register – Security, Arabian Business, Silicon UK, DataBreachToday.com, Infosecurity Magazine, Graham Cluley, Security Affairs, TechNadu, Reddit-hacking, Packt Hub, Techradar

 

Tweets:@netblocks @gradient_cat @independent @fs0c131y @wikipedia @fs0c131y

NDTV.com : Parts of Wikipedia Offline After ‘Malicious’ Attack
RAPPLER: Parts of Wikipedia offline after ‘malicious’ attack
Channel News Asia: Parts of Wikipedia offline after ‘malicious’ attack
Reddit-hacking: Wikipedia is currently under a DoS attack. Most users in EU cannot access it.
The Independent: WIKIPEDIA DOWN: ONLINE ENCYCLOPEDIA NOT WORKING AS PAGES FAIL TO LOAD FOR SOME USERS
CCN: Wikipedia Temporarily Taken Down by DDoS Cyberattack
Haaretz : Access to Wikipedia blocked after first-of-its-kind cyber attack – Haaretz
NDTV : Parts of Wikipedia Offline After ‘Malicious’ Attack
BetaNews: Wikipedia taken offline by massive DDoS attack
Gizmodo: Wikipedia Goes Dark Across Europe, Middle East After DDOS Attack
Slashdot: Parts of Wikipedia Went Offline After ‘Malicious’ DDoS Attack
TechCrunch: Wikipedia blames malicious DDOS attack after site goes down across Europe, Middle East
Security – Computing: Wikipedia whacked in weekend DDoS attack
GBHackers On Security: Wikipedia Hacked – Hackers Take Down the Website with Massive DDOS Attack
The Register – Security: What a bunch of DoSers: Wikipedia says it was walloped by ‘bad faith’ actors over weekend
Arabian Business : Wikipedia blames Middle East cyber attack on ‘bad faith’ actors – ArabianBusiness.com
Silicon UK: Wikipedia Website Knocked Offline By DDoS Attack
DataBreachToday.com: Wikipedia Investigates DDoS Attack
Infosecurity Magazine: DDoS Attack Forces Wikipedia Offline
Graham Cluley: Wikipedia and World of Warcraft Classic targeted by DDoS attacks
Security Affairs: Wikipedia suffered intermittent outages as a result of a malicious attack
TechNadu: Wikipedia DDoSed and Went Offline in Most of Europe
Reddit-hacking: Wikipedia blames malicious ddos attack after site goes down across Europe and Middle East
Packt Hub: Wikipedia hit by massive DDoS (Distributed Denial of Service) attack; goes offline in many countries
Techradar: Wikipedia taken down after major DDoS attack

@netblocks: Confirmed: Wikipedia is experiencing intermittent global outages for the second time today; disruptions affecting all language editions of the online encyclopedia began 6:00 p.m. UTC; incident ongoing ?
@gradient_cat: #Wikipedia is currently down in Europe
@independent: Wikipedia has completely stopped working
@fs0c131y: A new skids band is in town. @UKDrillas claimed they are behind the DDOS attack of Wikipedia.You’ll never learn... Bragging on Twitter (or elsewhere) is the best way to get caught. I hope you run fast.
@wikipedia: Wikipedia has been experiencing intermittent outages today as a result of a malicious attack. We're continuing to work on restoring access. #wikipediadown
@fs0c131y: 1. Do you remember the skids who DDOS Wikipedia few days ago? Their Twitter account @UKDrillas has been suspended


October 14, 2019
Julia Kollewe / The Guardian

Julia Kollewe / The Guardian  
Thoma Bravo to Buy Sophos for $3.9 Billion Marking First Big Buy Outside U.S. for Increasingly Cybersecurity-Focused Private Equity Group

UK cybersecurity firm Sophos agreed to be bought by a US private equity group Thoma Bravo for $3.9bn (£3.1bn), marking the first acquisition outside the U.S. for the increasingly cybersecurity-focused buyout group. Thoma Bravo said it would carry out a six-month review of the business but indicated that a significant restructuring and material job losses were unlikely.

Related: ZDNet Security, City A.M. – Technology, PYMNTS.com, Computer Business Review, Help Net SecurityThe RegisterCRN, Sophos, ComputerWeekly: IT security, MSSP Alert, Bloomberg Technology, MarketWatch.com – Software Industry News, Evening Standard, SecurityWeek, DataBreachToday.com, Cyberscoop, TechCrunch, Channel News Asia

Tweets:@lehtior2

ZDNet Security: Thoma Bravo to buy Sophos for $3.9 billion
City A.M. – Technology: Sophos shares jump as private equity group secures buyout
PYMNTS.com: Private Equity Firm Thoma Bravo Acquires UK’s Sophos For $3.8B
City A.M. – Technology: Sophos shares jump as private equity group secures buyout
Computer Business Review: UK’s Sophos Sold for £3.1 Billion Cash
Help Net Security: Thoma Bravo to acquire Sophos for $3.9 billion
The Register: Private equity to gobble up Brit virus blocker Sophos for £3bn
Independent : Cyber security firm Sophos latest British company snapped up by foreign buyers – Independent.ie
CRN: Thoma Bravo In Talks To Buy All Of McAfee From TPG, Intel: Report
Sophos: Thoma Bravo Makes Offer to Acquire Sophos
ComputerWeekly: IT security: Researchers reveal the cyber campaign that built China’s new airliner
MSSP Alert: Sophos Acquired By Private Equity
Bloomberg Technology: Sophos Becomes Latest U.K. Tech Target in $3.8 Billion Deal – Bloomberg
MarketWatch.com – Software Industry News: Sophos shares soar 37% after $3.8 billion offer from U.S. buyout group
Evening Standard: Tech duo pocket £460 million as US swoop on FTSE software giant Sophos
SecurityWeek: Thoma Bravo to Acquire Sophos for $3.9 Billion
DataBreachToday.com: Thoma Bravo to Buy Sophos for $3.9 Billion
Cyberscoop : Thoma Bravo spends $3.8 billion on Sophos in private equity’s latest cyber deal
TechCrunch: Thoma Bravo makes $3.9 billion offer to acquire security firm Sophos
Channel News Asia: Buyout firm Thoma Bravo adds Sophos to its cybersecurity chest with US$3.8 billion deal

@lehtior2: Thoma Bravo offers to buy Sophos at $3,9M EV. FY19 EV/R 5,6x, EV/EBITDA 44,1x. Premium of 37.1% to last closing price. Interestingly, last winter Thoma Bravo was rumored to be in talks for McAfee https://crn.com/news/security/thoma-bravo-in-talks-to-buy-all-of-mcafee-from-tpg-intel-report Seems they settled on Sophos instead https://sophos.com/en-us/press-office/press-releases/2019/10/thoma-bravo-makes-offer-to-acquire-sophos.aspx
:


August 9, 2019
Kim Zetter / Vice

Kim Zetter / Vice  
Nearly Three Dozen Back-End Election Systems Made by Top Vendor ES&S Are Exposed on the Internet, Including Systems in Critical Swing States

A group of election security experts has found what they believe to be nearly three dozen back-end election systems in ten states, made by Election Systems & Software, the top voting machine company in the country, that are connected to the Internet, making them vulnerable to hacking. The prospect that these systems are connected to the Internet runs counter to the common assumption among election officials that voting machines are air-gapped and insulated from Internet attacks. Some of the systems are in critical swing states, including systems in nine Wisconsin counties, four Michigan counties, and seven Florida counties. Some of the systems have been online for at least a year and possibly longer than that. Although votes are generally stored on memory cards, which are removed when vote tabulations take place, some jurisdictions want to receive the results faster and send them wirelessly to an SFTP server connected to the Internet behind a Cisco firewall via what is supposed to be a brief connection. The researchers found, however, that some of the systems are connected to the Internet for months at a time and even all year long. Some experts fear that widespread misconfiguration of the firewalls takes place, virtually ensuring vulnerability to attackers. Even more critical back-end systems are connected to the Internet, such as the election management system used to program voting machines before the election. Kevin Skoglund, an independent security consultant conducted the research with nine others, all of them long-time security professionals and academics with expertise in election security.

Related: Slashdot, The Verge, Fortune, AP Breaking News

Tweets:@kimzetter @sheeraf @Emanuel Eggberg @katiedrumm @zackwhittaker @derektmead @katiekings

Slashdot : Critical US Election Systems Have Been Left Exposed Online
The Verge : Some election systems left online despite denials from officials
Fortune: Swing State Voting Systems Were Left Connected to the Internet for Months, Report Says
AP Breaking News: Georgia faces tight timeline for replacing voting system

@kimzetter: Exclusive: For yrs ES&S, top voting machine maker in US, has been saying its vote tabulators and election-management systems are not connected to the internet. That appears not to be true. Researchers say they found what appear to be 35 online.
@sheeraf: Never mind the sophisticated, nation backed hackers. We’ll leave the front door wide open for you. Another great @KimZetter story on how our election systems lack some pretty basic security
@Emanuel Eggberg: Please read this exclusive @KimZetter . Our election systems are more vulnerable than anyone would like to admit:
@katiedrumm: HUGE scoop from @KimZetter for @motherboard ...contrary to official denials, US election systems have been online for months, even years in some cases, including in key swing states:
@zackwhittaker: "At least 19 of the systems, including one in Florida’s Miami-Dade County, were still connected to the internet this week," reports @KimZetter .This is about as "holy shit" of a story as you get.
@derektmead: This is an incredible investigation from @KimZetter and the conclusion is STUNNINGLY bad. Every paragraph in this story is worse than the last, astounding negligence. This one stuck out to me: (link: https://www.vice.com/en_us/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials) vice.com/en_us/article/…
@katiekings: This investigation on election security by @KimZetter is terrifying. Here are few answers for how to help from @nytopinion . (link: https://www.nytimes.com/2019/07/27/opinion/election-security-mueller-trump.html) nytimes.com/2019/07/27/opi…


August 21, 2019
SECURITY NOW 728

SECURITY NOW 728  
THE KNOB IS BROKEN

Steve Gibson and Leo Laporte talk about the week’s top news including Kaspersky facilitates independent web tracking, what the heck is “CTF” ??, 23 Government agencies in Texas were hit with a well-coordinated ransomware attack last Friday, August 16th, “The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR” and more.

August 6, 2019
Michelle Nichols / Reuters

Michelle Nichols / Reuters  
North Korea Has Used ‘Cyberattacks’ Against Banks, Cryptocurrency Exchanges to Generate $2 Billion to Fund Its Weapons of Mass Destruction Program, Experts Probe 35 Attacks in 17 Countries, Report

North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using “widespread and increasingly sophisticated” cyberattacks to steal from banks and cryptocurrency exchanges, according to a confidential U.N. report to the U.N. Security Council North Korea sanctions committee by independent experts monitoring the country’s nuclear and missile programs. The experts said that they are investigating at least 35 instances in 17 countries in which North Korea attacked financial institutions, cryptocurrency exchanges, and mining activities. Many of the cyber actors involved in these instances operated under the direction of the Reconnaissance General Bureau, North Korea’s military intelligence unit.

Related: Washington Free Beacon, Task & Purpose, Khabarhub, Deccan Chronicle, The Next Web, CBSNews.com, Associated Press, EJ Insight, PCMag.com, Asia One WorldMashable, Security – Computing, NBC News Top Stories, Deutsche Welle, South China Morning Post, TIME, SecurityWeek, The Korea Herald

Washington Free Beacon: U.N. Report: North Korea Took $2 Billion in Cyberattacks to Fund Weapons Program
Task & Purpose: North Korea has generated $2 billion for weapons programs by hacking banks and crypto exchanges
Khabarhub : Inside story of North Korea’s multi-faceted illicit cyber activities – Khabarhub
Deccan Chronicle: North Korea took USD 2 billion in cyberattacks to fund weapons programme
The Next Web: UN: North Korean cryptocurrency hackers have earned up to $2 billion so far
CBSNews.com: Report: N.K. skirts sanctions, earns $2 billion via cyber attacks
Associated Press : UN report: North Korea cyber experts raised up to $2 billion
EJ Insight: N Korea hackers generated US$2 bln for weapons program: report
PCMag.com: UN: North Korean Hackers Raised $2B to Fund Weapons Program
Asia One World: North Korea took $2 billion in cyber attacks to fund weapons programme: UN report
Mashable: North Korea funds weapons program with stolen cryptocurrency, U.N. report claims
Security – Computing: North Korea made $2bn from cyber crime and spent it on weapons, claims UN
NBC News Top Stories: N. Korea funding missile tests through cyberattacks, according to U.N. report
Deutsche Welle: North Korea cyberattacks generate $2 billion for weapons program
South China Morning Post: North Korean hackers stole US$2 billion to fund weaponry, UN report reveals
TIME: North Korea’s Cyber Experts Raised Up to $2 Billion, U.N. Report Says
SecurityWeek: UN Report: North Korea Cyber Experts Raised Up to $2 Billion
The Korea Herald: UN report: North Korea cyber experts raised up to $2 billi


October 10, 2019
Mohit Kumar / The Hacker News

Mohit Kumar / The Hacker News  
Seven-Year-Old Critical RCE Flaw Found and Patched in iTerm2 macOS Terminal Emulator App

A seven-year-old critical remote code execution vulnerability tracked as CVE-2019-9535 has been discovered in iTerm2 macOS terminal emulator app, a popular open-source replacement for Mac’s built-in terminal app. An independent security audit funded by the Mozilla Open Source Support Program (MOSS) and conducted by cybersecurity firm Radically Open Security (ROS) found the flaw.  According to Mozilla, the vulnerability resides in the tmux integration feature of iTerm2, which, if exploited, could allow an attacker to execute arbitrary commands by providing malicious output to the terminal. The flaw can also be triggered using command-line utilities by tricking them into printing attacker-controlled content, eventually allowing attackers to execute arbitrary commands on the user’s Mac computer. The vulnerability affects iTerm2 versions up to and including 3.3.5 and was patched with the release of iTerm2 3.3.6.

Related: Security Week, US-CERT Current Activity, IT World, CERT Recently Published Vulnerability Notes, Mozilla Security Blog, Related: Security Affairs, The Register – Security, BleepingComputer.com, Help Net Security

Tweets:@TomRittervg


July 17, 2017
LOLITA C. BALDOR / Associated Press

LOLITA C. BALDOR / Associated Press  
U.S. to Create Independent Cyber Command, NSA to Become Civilian-Ruled, Report

As has been rumored and suggested for years, the U.S. plans to create a new independent Cyber Command, a branch of the military that is currently ruled by Admiral Michael Rogers, who also oversees the National Security Agency (NSA.) Under the new reported plan, Cyber Command will be split off from NSA to better focus on defense-related matters, while NSA will become subject to civilian rule. A final decision on the reorganization of NSA and Cyber Command is expected to be announced in a few weeks.

December 9, 2015
Joseph C. Chen / Trend Micro

Joseph C. Chen / Trend Micro  
Blog of News Site “The Independent” Hacked, Leads to TeslaCrypt Ransomware

The blog page of one of the leading media sites in the United Kingdom, The Independent has been compromised, which may put its millions of readers at risk of getting infected with ransomware. We have already informed The Independent about this security incident. However, the site is still currently compromised and users are still at risk.
Related: Hackerstorm.co.uk News, Network World Security, Office of Inadequate Security

[expand title=”More”]

[/expand]

May 2, 2019
Nancy Scola / Politico

Nancy Scola / Politico  
Possible Facebook Settlement With FTC Would Designate Company Executives, Including CEO, As Privacy Watchdogs, Would Create ‘Independent’ Privacy Oversight Committee

Facebook and the Federal Trade Commission (FTC) are negotiating a possible settlement that would place privacy-minded executives at the top of the company including CEO Mark Zuckerberg who would take on the role of “designated compliance officer” responsible for carrying out the company’s privacy policies, according to a source. The deal would be a result of an FTC investigation into whether Facebook violated its 2011 privacy consent decree when it allowed 87 million users’ data to fall into the hands of Cambridge Analytica. The deal would also include creating an “independent” privacy oversight committee that may include Facebook board members, in addition to a record-breaking fine of $3 billion to $5 billion. Under the proposed settlement, according to the source, the FTC would “essentially” have veto power over the choice of a federally approved privacy executive, called an “assessor,” and the new privacy oversight committee would meet quarterly and issue periodic reports on the company’s privacy practices. Privacy advocates believe this deal does not go far enough because it still leaves privacy decisions up to Facebook and contains no new restrictions on Facebook’s data handling practices.

May 5, 2018
Reuters / Warren Strobel

Reuters / Warren Strobel  
U.S. Cyber Command Officially Elevated to an Independent Unified Combat Command

The Pentagon’s cyber warfare unit, U.S. Cyber Command, received an elevated status and a new commander on Friday when Army Gen. Paul Nakasone took over leadership of U.S. Cyber Command. Under a “dual-hatted” arrangement, Nakasone, also took over as Director of the National Security Agency (NSA). Cyber Command was elevated to an independent “unified command,” a bureaucratic change that for the first time puts it on a par with nine other U.S. combat commands which include U.S. Strategic Command, U.S. Central Command, U.S. Pacific Command and others.