{"id":28493,"date":"2022-09-16T08:56:15","date_gmt":"2022-09-16T12:56:15","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=502995"},"modified":"2022-09-16T11:29:01","modified_gmt":"2022-09-16T15:29:01","slug":"cyber-security-today-sept-16-2022-queens-death-exploited-by-phishing-scam-new-linux-backdoor-found-and-more","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-sept-16-2022-queens-death-exploited-by-phishing-scam-new-linux-backdoor-found-and-more\/","title":{"rendered":"Cyber Security Today, Sept. 16, 2022 \u2013 Queen\u2019s death exploited by phishing scam, new Linux backdoor found, and more"},"content":{"rendered":"<p data-ar-index=\"0\">Queen\u2019s death exploited by phishing scam, new Linux backdoor found, and more.<\/p>\n<p data-ar-index=\"1\">Welcome to Cyber Security Today. It\u2019s Friday, September 16th, 2022 I\u2019m Howard Solomon, contributing reporter on cybersecurity for<em> ITWorldCanada.com.<\/em><\/p>\n<p data-ar-index=\"2\"><iframe style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/24377772\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-ar-index=\"3\">\n<p data-ar-index=\"4\"><strong>The death of Queen Elizabeth<\/strong> is being exploited by crooks. <a href=\"https:\/\/twitter.com\/threatinsight\/status\/1570092339984584705\" rel=\"noopener\">That\u2019s according to researchers at Proofpoint<\/a>. Someone is sending email messages pretending to be from Microsoft inviting victims to a so-called \u201cinteractive AI memory board\u201d to honour the late monarch. The memory board supposedly organizes millions of words and photos to commemorate the Queen. To take part, victims are asked to log in with their Microsoft usernames and passwords \u2014 which are promptly captured by the crooks. The scam can bypass multifactor authentication.<\/p>\n<p data-ar-index=\"5\"><strong>Here\u2019s another sign<\/strong> that cyber attacks are getting worse: Fifty-six per cent of 300 cybersecurity professionals recently surveyed said they\u2019ve seen a doubling in threat levels in the past year. Forty-eight per cent said the level of threat activity has increased since Russia\u2019s invasion of Ukraine. The survey was <a href=\"https:\/\/www.domaintools.com\/resources\/blog\/the-state-of-threat-hunting\/\" rel=\"noopener\">done by security vendor DomainTools<\/a>. It also showed more than 60 per cent of respondents said active threat hunting \u2014 rather than being defensive \u2014 helped them identify indicators of compromise for immediate response or blocking of attacks.<\/p>\n<p data-ar-index=\"6\"><strong>Researchers at Necrium Security<\/strong> have found vulnerabilities in two models of WiFi access points from Japanese manufacturer Contec. The FX3000 and FX2000 devices are used by a number of companies, including airlines. Exploiting the hole could lead to data plagiarism, falsification and system destruction. IT administrators with these devices in their networks <a href=\"https:\/\/samy.link\/blog\/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo\" rel=\"noopener\">should install the latest firmware.<\/a><\/p>\n<p data-ar-index=\"7\"><strong>The Los Angeles public school district<\/strong> <a href=\"https:\/\/www.latimes.com\/california\/story\/2022-09-13\/l-a-schools-chief-to-use-emergency-authority-in-cyberattack\" rel=\"noopener\">has given its superintendent the temporary power<\/a> to hire anyone without public tender to help deal with the aftermath of a ransomware attack that started over the Labour Day weekend. The emergency power will last 12 months. The hackers left behind tripwires with the potential to set off another chain of damage or compromised information, the school board says.<\/p>\n<p data-ar-index=\"8\"><strong>Finally,<\/strong> a Linux variant of the SideWalk backdoor implant has been discovered. <a href=\"https:\/\/www.welivesecurity.com\/2022\/09\/14\/you-never-walk-alone-sidewalk-backdoor-linux-variant\/\" rel=\"noopener\">Researchers at ESET believe<\/a> it\u2019s being used by an advanced threat group it calls SparklingGoblin. This particular backdoor has been used to compromise a Hong Kong university earlier this year, researchers say. It differs from the Windows version in that it leaves some unique fingerprints and is therefore easier to detect. There\u2019s a link in the text version of this podcast to the ESET report with more details.<\/p>\n<p data-ar-index=\"9\">That\u2019s it for now. But later today the Week in Review edition of the podcast will be out. This week\u2019s guest commentator is Terry Cutler of Montreal\u2019s Cyology Labs. We\u2019ll talk about ransomware, what IT security leaders can do if they are told to cut costs and why a British bank asked iPhone customers to turn off automatic iOS updates.<\/p>\n<p data-ar-index=\"10\">Remember links to details about podcast stories are in the text version at <em>ITWorldCanada.com.<\/em><\/p>\n<p data-ar-index=\"11\">Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.<\/p>\n<p data-ar-index=\"12\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-sept-16-2022-queens-death-exploited-by-phishing-scam-new-linux-backdoor-found-and-more\/502995\">Cyber Security Today, Sept. 16, 2022 \u2013 Queen\u2019s death exploited by phishing scam, new Linux backdoor found, and more<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This episode reports on one way crooks are taking advantage of the Queen&#8217;s death to steal credentials, how Los Angeles&#8217; school board is responding to a ransomware attack<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389],"class_list":["post-28493","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/28493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=28493"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/28493\/revisions"}],"predecessor-version":[{"id":28498,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/28493\/revisions\/28498"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=28493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=28493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=28493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}