It's not Fake News...It's a Content-based Cyber Attack.

Posted by Greg Mancusi-Ungaro

Wed, Nov 23, 2016

 

Facebook and Twitter have been talking a lot about fake news recently.
And so have a lot of other people. Depending upon who you read, and who you believe, fake news played a major role in the recent presidential election. But fake news isn't limited to politics. Fake news, and its relatives, are some of the most vexing types of external cyber attacks facing corporations, institutions and enterprises. 

“Fake news” can originate practically anywhere on the Internet -- through tweets, posts, blogs, wikis, discussion forums, chats, podcasts, digital images, video, audio files, advertisements and more.  There are even official "citizen journalist" sides like CNN's iReport or reddit, where end-users can directly publish their views, or their content, without fact-checking, editing, or any other kind of content-curation. 

This un-proctored, un-curated, un-fact-checked content creates a nightmare for enterprises.  These are content-based cyber attacks that don’t touch company infrastructure at all. They exist completely outside the firewall, beyond the traditional perimeter. But even without touching the targeted company directly these attacks can have huge impacts on a company’s revenues, operations, and reputations....

Read More

Topics: Social Media Monitoring, cyber threats, External Threat, Content-based Cyber Attack, Cyber Attack

The IoT Attack is Fascinating. It Puts Even More Emphasis on External Threats.

Posted by Greg Mancusi-Ungaro

Tue, Oct 25, 2016

Last Friday, cyber security experts were on the edge off their seats, mouths agape, as they monitored the progress (and effectiveness!) of the DDoS attack on Internet infrastructure provider DYN.  Last week’s attack differed from past attacks because the attacks were launched not from traditional devices, but from 10s of millions of discrete devices. Here’s what DYN said about the attack in their official statement of 10/21/2016:

At this point we know this was a sophisticated, highly distributed attack involving 10s of millions of IP addresses. We are conducting a thorough root cause and forensic analysis, and will report what we know in a responsible fashion. The nature and source of the attack is under investigation, but it was a sophisticated attack across multiple attack vectors and internet locations. We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.

Today, 48+hours removed from the original attack, we know a lot more... 

Read More

Topics: Social Media Monitoring, cyber threats, External Threat, IoT

Latest Political Cyber Fraud: Warren Endorses Sanders??!  No... It's Fake. (She Remains Neutral)

Posted by Greg Mancusi-Ungaro

Sat, Mar 05, 2016

2016 Elections Project Update:  On Monday, just before the Super Tuesday Democratic Primaries, this "NY Times" article made the rounds on social media:

It wasn't legitimate.  And it wasn't a parody.  It was a fraud, pure and simple. 

News of this fake article exploded on Monday, sending the NY Times and many other news organizations scrambling to disavow the article and have it removed from the web. Within a few hours, it was gone. But the damage may have already been done - the article was shared over 50K times, including 15K Facebook shares.  It was probably viewed by hundreds of thousands of people across all kinds of social channels.  Enough to swing an election? Possibly!   

Read More

Topics: scam, brand abuse, Reputation Management, Social Media Monitoring, cyber threats, impersonation, CISO, threatSMART, 2016 Elections

191 Million Voter Records Have Been Exposed. What Does it Mean To You?

Posted by Greg Mancusi-Ungaro

Fri, Jan 08, 2016

 

Over the past weeks there has been a lot of reporting, including these great pieces by Steve Ragan at CSOonline.com and Mathew J. Schwartz at BankInfoSecurity.com about a December 20, 2015 discovery that a database containing 191 Million voter records had been exposed online. As part of the BrandProtect 2016 Elections Project, we dug into the situation, and what it means to you.

Because of the nature of the exposure – effectively a database containing the records was left unlocked and unprotected – there is no way to know who might has downloaded the information.

Make no mistake, this is a big number. And it is an important number.  Consider this: the US Census Bureau estimated that there were approximately142 Million registered voters in 2014. This means that the recent exposure of 191 million voting records is not just a large data breach.  It’s a national issue -- effectively every registered voter in America has had their PII exposed... Wow...

Read More

Topics: Identity Theft, data breach, Social Media Monitoring, cybercrime, social media, online risk, PII, Spear Phishing, Voting Records, 2016 Elections

Viewpost Chooses BrandProtect

Posted by Greg Mancusi-Ungaro

Wed, Dec 02, 2015

Viewpost® Selects BrandProtect™ to Secure Complex Attack Surface

Payments Marketplace Provider Required a Solution With Round-the-Clock Threat Monitoring and Mitigation to Protect Its Customer Information From Beyond the Perimeter Attacks

Read More

Topics: Malware, mobile app monitoring, Security, Social Media Monitoring, Phishing, webinar, SMART, brandSMART, bankSMART, threatSMART

The BrandProtect Report: BlackFriday & CyberMonday 2014 [INFOGRAPHIC]

Posted by Greg Mancusi-Ungaro

Tue, Dec 16, 2014


  • Mobile App Threat Potential Triples
  • More than 150K scam and fraudulent activity mentions across Social Media
  • 27,000 unique phishing attacks
BrandProtect recently concluded a month of online threat monitoring focused in on detecting potential online scams and malicious activities targeting consumers during the BlackFriday / CyberMonday shopping season across the USA.

This is the third year that BrandProtect has investigated this online event.

Read More

Topics: black friday, Social Media Monitoring, Phishing, cyber monday, mobile malware

Credit Unions Need to Start Managing Their Social Media Risk

Posted by Natalie Gleba

Fri, Aug 01, 2014

credit-unions

On December 11, 2013, the Federal Financial Institutions Examination Council (“FFIEC”) released the article, Social Media: Consumer Compliance Risk Management Guidelines, to educate financial institutions about the risks involved in using social media. There are no additional obligations, however, this Guidance strongly suggests that financial institutions, effective immediately, become educated on the potential compliance, reputation and operational risks as it relates to social media use, and implement these guidelines into their risk management strategy. Credit Unions, like Banks, can benefit from these risk assessment strategies and need to be aware of the reputational damage that can occur via social media as a result of neglecting risk management. Here are the summarized risks that Credit Unions should be aware of and integrate into their risk assessment process:

Read More

Topics: Brand Protection, risk management, Social Media Monitoring, Phishing, social media, cyber threats, online risk

Why Social Media Risk Planning is Necessary for Brand Image

Posted by Natalie Gleba

Fri, Jul 11, 2014

It is no surprise that 84% of businesses have now adopted social media to implement an online presence to communicate with customers and overall, increase their brand reach [1]. Whether a small independent business or a large B2B company, it is more evident than ever that businesses who do not build and maintain an online social media presence will get left behind, and evidently lack competitiveness. Having a social media presence offers clear advantages for marketing and sales departments, however, with this comes the disadvantage of having increased social media risks that could potentially harm the company’s brand. Therefore, it is extremely important that businesses adopt a Social Media Risk Plan to manage their reputation online and know how to mitigate potential threats.

Read More

Topics: Brand Protection, risk management, defamatory, brand abuse, online brand protection, Reputation Management, Social Media Monitoring, employees social media, online identity, social media, Internet Threats, Risk, internet security, cyber threats

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

  Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all