Threat Intelligence Blog



Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Top Cyber Security Incidents


  • In the weeks since the World Health Organization officially classified glyphosate as a ‘possible carcinogen to humans,’ activist groups and local governments have increased their efforts to oppose the sale and use of the herbicide. We can expect to see a continued ripple effect on the international arena as well, as many agriculture dominant economies begin to push back against the high levels of required usage of the pesticide.


  • Healthcare cybersecurityCybersecurity: A set of security techniques that are designed to protect the integrity of computer systems, programs and data from theft and damage to their hardware, software or other information as well as the disruption and misappropriation of their services. LookingGlass Cyber (n) - Professional paid ninjas who protect the cyber world from cyber attacks. Everybody is doing it, but we have the double black belt with the Versace logo. So yeah, we’re really good. threats are an increasing issue for the industry, but healthcare data breaches can occur in numerous ways. An apparent shift is underway though, as the major cause of health data breaches is not necessarily due to device theft.  Recent research shows that device theft was the leading cause of healthcare data breaches several years ago. However, the Department of Health & Human Services’ (HHS) database on such incidents also shows that cyber attacks were the main issue for the first few months of 2015.

Health IT Security

Financial Services

  • The House of Representatives last week voted 307-116 to pass the Protecting Cyber Networks Act, a bill designed to allow more fluid sharing of cybersecurity threat data between corporations and government agencies. That new system for sharing information is designed to act as a real-time immune system against hacker attacks, allowing companies to warn one another via government intermediaries about the tools and techniques of advanced hackers.


Legal and Regulations

  • Emails sent by President Barack Obama were swept up in a 2014 hack on the White House’s unclassified computer network, and the hackers are presumed to be linked to the Russian government.

New York Times


  • Researchers have identified a serious vulnerability in Magento, the popular e-commerce platform owned by eBay. The security hole exposes the details of millions of individuals who shop on the hundreds of thousands of online stores that use the system.

– SecurityWeek


  • Google says it’s working to improve its spam-detection systems in its Google Maps platform after yet another prank allowed a user to upload an inappropriate image to Google Maps.



  • Operation Pawn Storm allegedly run by hackers backed by the Russian Governmentis still advancing their infrastructure a great deal, the group is believed to using advanced tactics to hit the targets. Trend Micro revealed that the group has introduced all new infrastructure and is “Zeroing in” onto the targets that includeNATO (North Atlantic Treaty Organization) members. The group behind Operation Pawn is allegedly linked to government of Russia, and has been operating since 2007. The main targets of this hackingHacking: The using of a computer and/or program in order to gain unauthorized access to data in a computer, system or network. LookingGlass Cyber (n) - not the axe swinging you’re thinking of. This type of hacking is unauthorized access to another computer, or system. group include defense industry, military, government organizations, and media firms.

– Security Affairs


Additional Posts

‘Operation Armageddon’ Cyber Espionage Campaign Aimed at Ukraine: Lookingglass

Researchers at Lookingglass Cyber Solutions outlined details of a cyber-espionage campaign aimed at ...

Three Takeaways from the Verizon PCI Compliance Report

  At the beginning of the year, we wrote about how threat intelligence can help organizations ...