It’s Starting: The First Cyberattack on the U.S. Grid Reported

Reports of an unparalleled grid “cyber event” caused a stir in power sector and cybersecurity circles. The grid runs everything. Forget how powerful the Grid is. Think how many other vital infrastructure sectors rely on electricity? Yes, it is everything.

Exposed Records Up 126% in 2018 Breaches

Digital Directorship Cybersecurity:Data Security/Privacy Exposed Records Up 126% in 2018 Breaches Source:  InfoSecuirty Magazine: Feb 05, 2019 The overall number of breaches fell in 2018, but the number of compromised records skyrocketed, resulting in a 126% increase, according to the 2018 End-of-Year Data Breach Report. The Identity Theft Resource Center tracked the data breach events…read more.

Finally, a Breakthrough in Cybersecurity Protection

The breakthrough is TrustWrx . It effectively “firewalls” the entire communications channel.  TrustWrx provides an architecture for secure communications where the fraudsters simply cannot operate. Simply put, if they cannot connect or talk to a server or network, then they cannot hack into it or steal data. 

Cyber-Hijacking Campaign Sets off Global Government Alarm Bells

Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) is tracking a series of incidents involving Domain Name System (DNS) infrastructure tampering. CISA is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them.

Attackers have redirected and intercepted web and mail traffic, and could do so for other networked services.

Russian cyberattack “should wake us up,” former Air Force officer says

Earlier this month, the Department of Homeland Security confirmed that Russian hackers have infiltrated the U.S. electric grid. That means they may have the ability to shut down major power plants. The targeted facilities included at least one nuclear power plant and other types of infrastructure as well.

Cyber Attacks are leading to US Navy Collisions

While Pentagon seems to be busy investigating the cause of USS John S McCain Navy Ship’s collision with a Singapore Oil tanker, reports in the media are emerging that there could be a hand of North Korean Cyber Army behind these attacks.

Did IoT Cyberattacks cause NY Power Transformers to Explode?

Officials blamed a power surge for the blackout on Dec. 28th that left LaGuardia airport in the dark for about 45 minutes, grounding flights. A look at the trend of power outages at American airports shows a disturbing pattern and possibly sinister cause…cyberattacks.

Your data was probably stolen in cyberattack in 2018

Billions of people were affected by data breaches and cyberattacks in 2018 – 765 million in the months of April, May and June alone – with losses surpassing tens of millions of dollars, according to global digital security firm Positive Technologies.

Chinese Hackers Breach U.S. Navy Contractors

Chinese hackers are breaching Navy contractors to steal everything from ship-maintenance data to missile plans, triggering a top-to-bottom review of cyber vulnerabilities.

NRCC officials hacked during 2018 election

The National Republican Congressional Committee (NRCC) said Tuesday that it was the victim of a cyber intrusion during the 2018 campaign season. The email accounts of four senior aides at the organization were surveilled for several months.

TOP 10 of the world’s largest cyberattacks

The number of cyber attacks has grown steadily during the last few years. In 2016, 758 million malicious attacks occurred according to KasperskyLab, (an attack launched every 40 seconds) and there is no doubt that 2019 will break the record.

Hackers breach and steal password data for 100 million users

Hackers breach and steal password data for 100 million users Other stolen personal data includes names, email addresses, and direct messages. Source: DAN GOODIN – 12/3/2018 Brace yourself for yet another massive data breach., a site where people ask and answer questions on a range of topics, said hackers breached its computer network and…read more.

Russian Hackers Haven’t Stopped Probing the US Power Grid

In recent years, hacks against the power grid have gone from a mostly theoretical risk to a real-world problem. Two large-scale blackouts in Ukraine caused by Russian cyberattacks in 2015 and 2016 showed just how feasible it is. Russia’s continues to probe US critical infrastructure alarming.

Biggest cyber security breaches 2018

All the social networking sites we use, the apps, everywhere where we give consent to access our information is making our profiles in their respective directories. Are they secure? Obviously not!

9 cyber security predictions for 2019

The threat landscape is huge, offensive and defensive technologies are evolving rapidly, and nation-state attacks are increasing in terms of scope and sophistication.

DNS over HTTPS seeks to make internet use more private

DNS over HTTPS. DNS over HTTPS (DoH) is a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol. A goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks.

Marriott discloses massive data breach affecting up to 500 million guests

Marriott said Friday that hackers have had access to the reservation systems of many of its hotel chains for the past four years, a breach that exposed private details of up to 500 million customers while underscoring the sensitive nature of records showing where and when people travel — and with whom

3 phishing hacks breach 20,000 Catawba Valley patient records

While investigating one phishing attack in August, medical center officials discovered a hacker had access to three accounts for more than a month. North Carolina-based Catawba Valley Medical Center is notifying 20,000 patients that their personal data was breached after three successful phishing attacks.

CMS responds to data breach affecting 75,000 in federal ACA portal

Digital Directorship Cybersecurity: Healthcare CMS responds to data breach affecting 75,000 in federal ACA portal Source: Healthcare Finance – OCT 22, 2018 Susan Morse, Senior Editor The files of an estimated 75,000 individuals were accessed in a breach of for Affordable Care Act enrollment, according to the Centers for Medicare and Medicaid Services. CMS said…read more.

Two phishing attacks on Minnesota DHS breach 21,000 patient records

Digital Directorship Cybersecurity: Healthcare Two phishing attacks on Minnesota DHS breach 21,000 patient records For more than a month, two separate employee accounts were compromised by the cyberattacks before the IT department discovered the hack. Source: Healthcare ITNews | By Jessica Davis October 12, 2018 Two employees of the Minnesota Department of Human Services fell for…read more.

The Pentagon: Incompetent on Cybersecurity

The Pentagon scores dead last in federal information technology management rankings. This reveals woeful risk management and technology modernization. It’s all the more inexcusable when the DoD’s budgetary leeway is taken into account.

Experts Bemoan Shortcomings with IoT Security Bill

The infosec community say California’s IoT security bill is “nice,” but doesn’t hit on the important issues. It will be the first potential connected device regulation to come into effect in the United States if California Gov. Jerry Brown decides to sign it — however, some researchers say that the legislation, called Information Privacy: Connected Devices, fails to address fundamental issues plaguing IoT security.

What the 2019 Global Security Budget Looks Like for Healthcare

Security concerns are on the rise, especially in healthcare with system violations occuring at an alarming rate. A recent report put out by research firm Gartner estimates the world will spend over 124 billion dollars on information security in 2019.

Electric Power Grid Security: It’s Time

Digital Directorship – Cybersecurity – Utilities: Electrical Grid Electric Power Grid Security: It’s Time 09/12/2018 By Jon Stanford – PowerGrid International Cisco Over the years I’ve had hundreds of thought-provoking conversations with utility CISOs and other industry security professionals. Heck, I was a utility CISO myself at one time, so I know the territory. In…read more.

Cyber risks can come in direct strikes targeted toward electrical grid or other crucial infrastructure which may impact the operations or safety of this grid. Cyber risk of the grid are intrusions concentrated on manipulating industrial management system networks.

How to Build a Network of Security Champions Within Your Organization

Digital Directorship – Cybersecurity How to Build a Network of Security Champions Within Your Organization Improving security awareness with specialized programs is essential for small businesses and large corporations alike, but is it enough? Read full article at Infosec  Institute According to Joanna Huisman, research director at Gartner: “The problem is that these traditional security…read more.

How vulnerable is the grid to cyberattacks, really?

The very real possibility of localized action is out there, but the grid is not going down tomorrow, next year, or anytime in the near future. This highly protective article may be quite misleading in its positive outlook.

Is IoT’s dubious security past coming back to haunt it?

Digital Directorship – Cybersecurity – IOTIs IoT’s dubious security past coming back to haunt it? The IoT’s patchy security record has long been a source of discussion in security circles, but the Mirai malware attack in October 2016 was probably the point where the rest of the world stood up and took note as well.…read more.

How To Protect the Connected Energy Grid

A March 2017 MIT report found that both electricity and oil-and-gas industry leaders “believed that unduly complex, and insufficiently secure, hardware, software, and industrial controls were a significant source of cyber vulnerabilities.”

What is The Role of the Cyber-Risk Committee?

Digital Directorship – Cybersecurity What is The Role of the Cyber-Risk Committee? Cyber-risk is an enterprise-wide risk that corporations are wisely placing on the high-priority list, now and for the long term. Such issues as mobile technology, cloud computing, social media, increasing incidences of breaches, corporate espionage and hacks that shut down operations have made…read more.

Equifax breaks down just how bad last year’s data breach was

Equifax has revealed the exact scope of the massive breach that exposed sensitive data about millions of Americans — including confirmation that thousands of passports and driver’s licenses were compromised along with the Social Security numbers of nearly all of the more than 146 million affected consumers.

How To Secure The Internet Of Things

Attacks using the Internet of Things (IoT) jumped by 280%, as hackers become ever-savvier! The problem has become pervasive enough that the U.S. Department of Commerce has moved to set standards for security.

The Relationship Between Cybersecurity and Corporate Governance

As headlines of every newly discovered breach emerge, they reinforce the message to board directors of the extreme complexity and sophistication of technology. Cyber risk is not only here to stay, it’s sure to become even more complex in the coming years.

What is security’s role in digital transformation?

Traditional security approaches designed for maximum control will no longer work in the new era of digital innovation. Existing DX projects often fall down because they involve security late or not at all.

War room to boardroom: The new era of cybersecurity

War room to boardroom: The new era of cybersecurity BY JACQUELINE RAMOS, OPINION CONTRIBUTOR — 01/30/18 01:10 PM EST 1 THE VIEWS EXPRESSED BY CONTRIBUTORS ARE THEIR OWN AND NOT THE VIEW OF THE HILL Read full article at The Hill Facebook’s hire of its first ever head of cybersecurity policy is recognition that protecting…read more.

Safeguarding your biggest cybersecurity target: Executives

Safeguarding your biggest cybersecurity target: Executives Senior executives are among the favorite targets of malicious hackers and other bad actors, in part because they are more likely to hold valuable information — or have a high level of access to such data.

Cloud and big data analytics

The ITWeb Cloud Summit is in its second year in the current format, and brings you more than ever before in experts, content, case studies, and relevant local insight.

Cyber security and AI predictions 2018

There will continue to be a tremendous amount of ransomware moving forward as exploits emerge, as this is the vector these attacks rely on.

Netflix Phishing Scam Targeting Users

Thousands of Netflix customers have been targeted by a phishing attack, the scam is aiming to fool customers into handing over their credit card details.