Connect with us

Cyber Security

Customer Data Breach: eBay Joins a Growing List of Hacked Companies




Reading Time: 2 minutes

eBay Inc. issued a public statement today asking customers to change their web site passwords due to a breach of their customer database systems. Although they assert that the number of customer accounts compromised is small, and there is no evidence that the stolen data has been used by the hackers, all customers should take the step of changing their login credentials.

The statement said the database was compromised between late February and early March and included eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth. No financial information or other confidential personal information was breached. The company also stated that PayPal data is stored on a separate secured network and is encrypted.

The hackers gained access to the eBay network by obtaining the login credentials of several key employees. The compromised log-in credentials were first detected about two weeks ago.

While the statement did not elaborate on how the employee credentials were compromised, hackers are known to be increasingly using the techniques of Advanced Persistent Threat (APT) attacks to target very specific individuals in organizations. For example, instead of sending deceptive emails to a wide audience, phishing, they may attempt to identify specific individuals and use information available on public sites such as Facebook and LinkedIn to craft plausible emails that attempt to trick the recipient into clicking on a malicious link. The recipient is more likely to be fooled if the email appears to be from a school they actually attended or is about a company event that is really taking place.


Cyber Security

Threat Landscaping




The past six months has proven that the threat landscape has changed forever. Threat intelligence is one of those posture-forward initiatives. Our upcoming Year-End Report will shed light on the fact that it is a growing focus for the community. In concert with that growing focus, we asked a few of our close friends, what has changed and what should executives do now?



Santosh Kamane, Vice President Information Security, DBS Bank

“Phishing, malware, ransomware attacks are on the rise because adversaries know that users are isolated from their workplaces. Organizations who worked in a security environment where they were not prepared to work remotely have had a particularly hard time. They did not have do’s and don’ts on how to handle phishing emails, malware, and ransomware, what to click, what not to click, when to report incident, etc.- those base practices in place.”

Santosh notes that security awareness was low on our way into the pandemic. That means that all of the security awareness focus for the past two years simply got the community to a less than optimal outcome. Security awareness campaigns continue- but it’s possible the strategy of communication needs to be examined.

What might be most interesting about Kamane’s response is that he’s not discussing feeds- he’s talking about basic human threat intelligence. What good do the best feeds do you if Dave from accounting just opened the wrong email?

Kayne McGladrey, Senior Member, IEEE

“We were in the hype cycle with threat intelligence, and as a direct consequence, organizations are evaluating their threat intelligence providers and asking, is this actionable? Is this relevant? You can have two separate threat intelligence feeds covering the exact same industry, and you’re getting entirely different signaling information out of them. So I think that there’s a hesitancy to invest more in threat intelligence rather than to pick the feeds and providers that are providing the most actionable information.”

Kayne is talking about feeds. But all feeds are not created equal and a great way to know if your given feeds are of any value to you is if you’ve taken action on anything anytime recently. Another way to know if you’re feeds are of any value is to quantify.

“Have a KPI about value that came out of your threat intelligence feed. Did it actually cause you to do something differently? Were your analysts able to act on this, or was it just another thing that they had to go look at? Because when you think of time as being our chief enemy, if it’s sucking time and not producing value, why do you keep it? It’s a data feed, ultimately. At the end of the day, you have to contextualize it in terms of your organization. Threat actors tend to vary in terms of behavior in their TTPs. And consequently, you need to really tailor your threat intelligence. And if you’re not getting that tailored information, drop it.”

One might argue that tailored information for your organization is more valuable than general information. Kayne is arguing that general information is not valuable. But he stops short of offering that company-specific feeds are the only feeds that matter.

“Is there an ISAC, an information security association, that’s sharing similar information that you could just get by being a member? That could also be a better public/private partnership to address these issues, in addition to a commercial entity that’s allegedly providing intelligence, whereas, in fact, they’re just providing data.”

Make some friends. Share some information. Which brings us to our second question.


Kayne McGladrey, Senior Member, IEEE

“Definitely, make a contact with your local veterans employment representative, your LVER. You can find those through America’s job network, and just find out. Like the other thing, ultimately, your HR departments will be pleased with because LVERs are not a paid service. You can basically hire people- with no hiring or headhunter fee or associated cost structure- who are going to be motivated and talented. They might need to learn your tool chain, but the actual intelligence skills to disambiguate and make sense of a threat intelligence feed or feeds, as well as what you’re seeing off your SIEM telemetry- that’s invaluable. You cannot put a price on that.”

Many folks are talking about investing more into threat intelligence. And many of those folks are talking about investing in automated analysis of threat intelligence feeds. An alternative to automating your (potentially unproven) feeds is hiring a veteran who all-in will likely be cheaper while having intelligence chops that are proven.

Santosh Kamane, Vice President Information Security, DBS Bank

“The key is zero trust architecture. It talks about addressing your internal and external traits at the same time. We always considered our employees, as non-mobile, internal resources that would always be in-office, now everybody’s on the move. That makes the threat level for external and internal players pretty much same. And in some cases with the internal employees it’s higher, because they hold so much knowledge, they already have keys to enter into your network.”

Again Santosh discusses heading off threats at the pass. It seems he in fact is on the pulse of where the industry’s issues lie. How can we justify unproven investment on “detect” threat landscape initiatives if “protect” threat landscape initiatives are vulnerable?

“The focus would be on how you build, purely a good a zero trust architecture to gain better visibility into everything that goes into your network- a centralized view- to have centralized security administration. Everything that goes in and out of the network that needs to be built, scrutinized, everything needs to be logged. Everything needs to be assessed on why that particularly activity was allowed or denied.”

As a coda to his contribution, Kamane urges folks to focus on the solution as opposed to the problem. So one might suggest that even if you’ve got the VPN in place because you just invested in that architecture. Rather than invest further in threat intelligence feeds or automation, use that money on a ZTNA (Zero Trust Network Architecture). Or, close the doors before you worry about the windows.

Jeff Campbell, CISO, Horizon Power

“Adopt that model of sharing. It’s all about knowledge sharing. It doesn’t really matter which threat Intel feed to which you subscribe. Don’t be overwhelmed by the number of available services- choose a framework, choose a model that you feel comfortable with, or that is purpose fit for your organization- and then start to structure your intelligence feeds or threat Intel around what you’re trying to achieve. If you’re trying to mature your cybersecurity practice, then look at threat feeds that will actually give you practical ways of remediating.”

Jeff makes like Steven Covey and suggests that you begin with the end in mind. What outcome are you trying to achieve? Answer that question. Then- just as Kayne suggested- customize your feeds as well as you can to your particular organization. And-  just as Kayne suggested- ensure that you are getting information which is actionable.

Dennis Leber, CISO, University of Tennessee

“Review your program and look at how you’re operationalizing that program. Look at what you’re doing with the data. You know how to improve. Look for opportunities to improve on what you’re doing already, and then share it, share your best practices with your peers and other companies.”

No matter what you do- once you have your threat intelligence working for you. A great final point by Dennis- share with your peers. The cyber security community is stronger and safer when collaboration occurs.


Continue Reading

Cyber Security

Huobi expands fiat gateway to support AUD, GBP and EUR through Banxa




Huobi expands fiat gateway to support AUD, GBP and EUR through Banxa

Huobi Global, the world’s leading digital asset exchange, today announced support for the Australian dollar (AUD), British pound sterling (GPB), and Euro (EUR) through Banxa, an internationally compliant fiat-to-crypto gateway solution. The partnership allows users in Australia, UK, and the European Union to purchase cryptocurrencies with their official fiat currencies.

By integrating with Banxa’s payment solutions, Huobi is able to provide users with more flexibility and choice in payment methods, while also enabling a seamless user experience. Users can access the new fiat-to-crypto gateway directly from the Huobi OTC site and deposit AUD, GBP, or EUR to begin trading cryptocurrencies in just a few clicks. Funds can be instantly added to a user’s account using bank transfers, debit/credit card, and other preferred payment methods with zero fees.

“Our partnership with Banxa allows us to support three of the world’s most widely-used fiat currencies, marking a significant milestone in our global expansion,” said Ciara Sun, Vice President, Global Markets at Huobi Group. “With our newly expanded fiat gateway, we want to help accelerate crypto adoption by making digital assets much more easily accessible to the masses. This integration introduces a new point of access for users in Australia, UK, and the European Union looking to enter the crypto market.”

Domenic Carcosa, founder and Non-Executive Chairman of Banxa said. “Huobi is a first mover heavyweight, with some of the most innovative products and services in the industry. As digital assets become mainstream and move toward mass adoption, regulation and transparency are key to building trust. That is why we’ve chosen to partner with Huobi.”

From the ‘Buy Crypto’ page on Huobi OTC, users can select the digital asset they’d like to purchase, choose their fiat currency, and enter the fiat value or asset quantity for purchase. After selecting their preferred payment method, which includes Visa and Mastercard transactions, users can purchase up to $20,000 USD worth of digital assets in a single transaction. The daily purchase limit is $15,000 and the monthly purchase limit is $60,000.

Users are also required to submit a one-time identity verification as part of the transaction process. Once completed and the payment approved, users can access their assets in their exchange account within a few minutes. From there, users can immediately select a trading pair and start crypto-to-crypto trading.

Sun added, “As we bolster our global presence and expand into new markets, we will continue adding new fiat on-ramps to give all users a frictionless onboarding experience. We recently set out on an ambitious new goal to empower 100 million households worldwide to own digital assets, so we want to ensure we make it faster, easier, and more secure for new users to get started.”


Continue Reading

Cyber Security

Australian Cyber Week 2020 showcases vibrant, growing sector




Today, the Federal Minister for Industry, Science and Technology, The Hon Karen Andrews MP, launched the fourth annual Australian Cyber Week, a week-long series of events and activities nationally coordinated by AustCyber – the Australian Cyber Security Growth Network.

The official launch event, featuring Minister Andrews, Innes Willox of the Australian Industry Group, Chris Painter of the Global Forum on Cybersecurity Expertise, industry heavyweight David Thodey and AustCyber’s CEO Michelle Price, will highlight the shift to digital through the COVID-19 pandemic and how it is accelerating the economy – a theme that will be explored further throughout the week through almost 30 events spanning the full breadth of the cyber security landscape for those within the sector, but also well beyond.

Held from 26-30 October, Australian Cyber Week 2020 provides opportunities for Australian cyber security and related organisations to showcase their capabilities and network with peers, potential investors and customers. It also provides an excellent way for cyber curious individuals and organisations to better understand what cyber security can do and mean for them.

“Cyber Week 2020 is one of AustCyber’s key programs under our mission to grow a globally competitive cyber security sector,” said Michelle Price, CEO of AustCyber. “The events during Australia’s Cyber Week connect Australian cyber capabilities with key domestic and international stakeholders who are contributing to the growth and success of the sector and creates further opportunities to enhance future economic growth.”

Australian Cyber Week has traditionally featured in-person events and activities at various locations across Australia. In 2020, AustCyber is debuting a new virtual conference platform which features 100% Australian technology. The 3D ‘circuit board city’ is the gateway to daily live events, a networking hub and exhibition hall showcasing booths which feature sovereign products and services. Online events will be complemented by in-person events in South Australia and Western Australia, facilitated through AustCyber’s National Network of Cyber Security Innovation Nodes.

“Each day, Australian Cyber Week has a feature event to demonstrate our globally completive cyber security ecosystem,” said Ms. Price. “The range of speakers is broad – ranging from CEOs of large corporates and venture capital investors, to ethical hackers, school students with a keen interest in cyber, and those with disabilities working within the sector.”

Later today, AustCyber in partnership with Cynch Security, Deakin University and RMIT University, will explore small business attitudes towards cyber security. While small businesses have had to fight for survival during the COVID-19 crisis, the unprecedented period of digital adoption has left many exposed to threats they are unprepared for. As Australia looks towards the future again, there has never been a more important time than now to understand the challenges this sector faces. This event will provide paths forward for building cyber fitness in the most vulnerable businesses.

AustCyber has partnered with CISO Lens and cyber security accelerator CyRise to host Sky’s the Limit on Tuesday 27 October. This event will feature ten Australian cyber security companies delivering short pitches to executives from ASX listed companies from key Australian sectors including advanced manufacturing, health, consumer services, mining and financial services.

To underline the importance of digital trust in keeping our digital activity secure and resilient, during an event on 28 October, AustCyber will simulate a significant cyber-attack on Australia through a hypothetical situation. Experts from the Australian Energy Market, Siemens Digital Industries Australia, TOLL Group and cohealth come together to examine the impact on critical infrastructure, crucial parts of our society and how it would impact almost all of us.

The National Missing Persons Hackathon 2020, held on 29 October, is one of the most innovative events to be held in Australia this year and is being held in partnership with the Australian Federal Police, National Missing Persons Coordination Centre and Trace Labs.

This event will see the gathering of ethical hackers and investigators using online investigative techniques within the bounds of the law to find new leads on 12 real missing persons cases in Australia. Contestants will be using their cyber skills to gather open source intelligence (OSINT) on long-term and current missing persons using only information that is publicly available on the internet. The goal of this is to generate new leads on cases that can aid the relevant Australian policing jurisdictions in their investigations.

“We are excited to be returning for 2020 and going virtual for the first time,” said Linda Cavanagh, National Network Lead at AustCyber and Founder of the National Missing Persons Hackathon. “Theoretical concepts are put aside so participants can operate in real time, with real data, for real human impact. Imagine the possibility of a missing person case being solved by the community using crowdsourced cyber skills! Helping close a case would be a great result and show the value and power of OSINT.”


Continue Reading
Energy3 hours ago

WHO experts acclaim Arawana as an oil of the 5G era, and they recommend the consumption of trans-fat-free cooking oils

Energy4 hours ago

FIBRA Prologis Anuncia a Carlos Elizondo Mayer Serra como nuevo Miembro Independiente del Comité Técnico

Cyber Security4 hours ago

Threat Landscaping

Energy4 hours ago

FIBRA Prologis Appoints Carlos Elizondo Mayer-Serra as a New Independent Member of the Technical Committee

Esports4 hours ago

XTQZZZ on Vitality’s six-man roster: “We’re going to make substitutions mid-series depending on the map”

United States
Esports5 hours ago

OG move past Evil Geniuses in BLAST Premier Fall Series

Esports6 hours ago

Boneyard Bunker Codes in Warzone: How to Open Both

Energy6 hours ago

Sunoco LP Maintains Quarterly Distribution

Energy7 hours ago

CVG Announces Third Quarter 2020 Conference Call

Esports7 hours ago

EA Modifies The Sims 4 Expansion pack and Trailer Out of Consideration for Korean Players

Esports7 hours ago

Warzone Punisher Pumpkin Bug: What’s the Issue?

Esports7 hours ago

FIFA 21 Global Series: Full List of FGS Swaps 1 Events

Energy7 hours ago

Taseko Reports $32 Million of Adjusted EBITDA in the Third Quarter 2020

Esports8 hours ago

Spencer: Xbox is Not Currently Planning Which Zenimax IP Will Be Exclusives

Esports8 hours ago

New England Whalers replace FURIA in IEM Beijing-Haidian

Esports10 hours ago

NAVI defeat NiP in BLAST Premier Fall Series opener

AR/VR10 hours ago

What the VR is Going on at Facebook? Accounts, Store Content and the Splits

Cannabis12 hours ago

Jay-Z announces new line of cannabis products dubbed Monogram

Energy13 hours ago

The Rockefeller Foundation commits USD1 billion to catalyze a green recovery from pandemic

Energy13 hours ago

PJM Named a Top Adoption-Friendly Company in the United States for 14th Consecutive Year

Blockchain13 hours ago

Top 10 Blockchain-as-a-Service (BaaS) Providers

Energy13 hours ago

Defining Value in Supplier Selection: An NSK Perspective

AR/VR13 hours ago

LBE VR: Past, Present and Post Civid Future

Blockchain News13 hours ago

Do I need to Buy One Whole Bitcoin? 3 BTC Questions I’m Tired of Answering

Esports14 hours ago

olofmeister to step in for FaZe in BLAST Premier as NiKo nears move to G2 – Report

Energy14 hours ago

ReneSola Power and Novergy to Form Joint Venture to Develop Solar Projects in the UK

Energy14 hours ago

S&P Global Platts Announces Finalists for ‘Leadership in Energy Transition Award’

Blockchain14 hours ago

Founder´s Packs now available for the first AAA blockchain game BLANKOS BLOCK PARTY

Blockchain News14 hours ago

Kevin Hart Jokingly Calls Crypto “Voodoo Money” While Kanye West Takes Bitcoin Seriously on Joe Rogan’s Podcast

AR/VR14 hours ago

Lenovo to Sell Varjo’s Enterprise VR Headsets

AR/VR15 hours ago

The Virtual Arena: The Ascendance of Arena-Scale Entertainment – Part 2

Energy16 hours ago

ICL Agrees to Acquire Fertiláqua, a Leading Brazilian Specialty Plant Nutrition Company

Fintech17 hours ago

How these fintech partnerships are shaking up finance

Esports17 hours ago

Four key storylines of BLAST Premier Fall Series

Energy17 hours ago

FMC Corporation Announces New Executive Role, Vice President and Chief Sustainability Officer, and Elects New Vice President of Procurement and Global Facilities

Blockchain News17 hours ago

Ant Group Chairman Eric Jing: Blockchain Will be the New Standard of the Future Financial Infrastructure

Payments17 hours ago

Cross border payments part 1: the competition is really, really old 

Energy17 hours ago

Decarbonization Plus Acquisition Corporation Completes Initial Public Offering

Energy17 hours ago

SESCO Lighting Announces new CEO

Esports17 hours ago

Discussing roster changes, recent tournaments, and NA teams in Europe on HLTV Confirmed S5E12 with smooya