Saturday Security Spotlight: Malware, AWS, and US Defense

This post was originally published here by Ā Jacob Serpa.

Here are the top cybersecurity stories of recent weeks:

  • AndroRAT malware spies on Android users
  • Smart TVs easily hackable
  • BuckHacker tool finds unsecured data in AWS buckets
  • Octoly breach exposes social media stars’ personal data
  • Russian hackers target US defense contractors

AndroRAT malware spies on Android users

A new type ofĀ malware targeting Android devicesĀ gives hackers extensive control overĀ users’ phones. TheĀ threatĀ allows malicious parties to use devices’ microphones (to record audio), cameras (to take pictures) and files (to steal information). This is obviously a large privacy concern for Android users around the world.Ā 

Smart TVs easily hackable

As new types of devices connect to the internet, nefarious individuals have more targets to attack. In particular,Ā Samsung and Roku televisions were recently deemed to have multiple vulnerabilities. Hackers can target certain security gaps to control volume, channel, and more. This raises additional privacy concerns around consumers being monitored within their homes.Ā 

BuckHacker tool finds unsecured data in AWS buckets

Whitehat hackers recently created a tool that uncoversĀ publicly available information resting within AWS buckets. While the tool is designed to help organizations uncover theirĀ misconfigurations within AWS, it also highlights the growing ease with which malicious hackers can steal unsecured data in the cloud.Ā 

Octoly breach exposes social media stars’ personal data

Brand marketing companyĀ Octoly was recently the victim of a breach, leaking the personal information of over 12,000 social media celebrities through, once again, an unsecured AWS S3 bucket. Data was exposed in the cloud for about a month before the vulnerability was noticed.Ā 

Russian hackers target US defense contractors

Hackers belonging to the Russian Fancy Bears group have beenĀ targeting US defense contractors. In an attempt to steal information about secret military technology and projects, they have been using targeted phishing emails.Ā This can obviously have extensive ramifications for the country’sĀ national security.

In order to addressĀ leaks, hacks, and malware, organizations must utilizeĀ next-gen security solutions. To learn aboutĀ cloud access security brokers,Ā download the Definitive Guide to CASBs.

Photo:BlogVault

Ad

No posts to display