News
  • "Hackers Hijack Tesla's Amazon Cloud Account to Mine Crypto-Currency"
    Security researchers at RedLock have discovered the use of an Amazon cloud account by hackers to mine cryptocurrency. The attack follows a series of cryptojacking attacks that have been recently launched by hackers to secretly use a victim’s…
  • "Framework for Policymakers to Address Debate over Encryption"
    The National Academies of Sciences, Engineering, and Medicine released a new report in which a framework is provided to policymakers for the evaluation or creation of proposals to allow authorized government agencies access to encrypted information…
  • "Cybercrime Causes over $600 Billion in Damage Annually"
    According to a report released by the Center for Strategic and International Studies (CSIS) and McAfee, the total annual cost of damages resulting from cybercrime and espionage is more than $600 billion. The total annual cost of cybercrime is rising as…
  • "The State of Ransomware: Attacks Up, Payments Down as Firms Fight Back"
    The number of detected ransomware attacks continues to rise, however fewer businesses are giving into the demands of payment behind such attacks. Therefore, ransomware attacks have become increasingly persistent and destructive, hindering the process of…
  • "AutoSploit: Making Massive Cyber Attacks Too Easy?"
    A tool by the name of AutoSploit has raised some concern among the security community as it significantly eases the process of launching cyberattacks for less-skilled hackers. The tool takes advantage of the Shodan search engine to perform automated mass…
  • "Cyber Threat Intelligence Improves Prevention, Detection, and Response Capabilities"
    The SANS 2018 Cyber Threat Intelligence Survey sponsored by DomainTools reveals that organizations are increasingly embracing the use of Cyber Threat Intelligence (CTI) in the battle against cyberattacks and hackers. The report highlights the importance…
  • "Researchers Show Docker Containers at Risk for Crypto-Currency Attacks"
    Researchers at Aqau Security Software conducted an exercise in which the operation of cryptocurrency mining by cyberattackers within cloud containers is further explored. The process of installing Monero cryptocurrency mining malware onto Docker…
  • "International Hackers Find 106 Bugs in U.S. Air Force Websites"
    The U.S. Air Force recently launched a bug bounty competition to which 25 white-hat hackers participated. The ethical hackers uncovered security vulnerabilities contained by the branch’s public-facing websites. The discoveries made by participants will…
  • "Security Awareness Training Top Priority for CISOs: Report"
    The FS-ISAC’s 2018 Cybersecurity Trends Report indicate that employee training should be a top priority for CISOs in the improvement of cybersecurity within organizations in the financial sector. The report emphasizes the need for organizations to…
  • “Meltdown-Spectre flaws: We’ve found new attack variants, say researchers”
    In a new report from Nvidia and Princeton, researchers from both organizations have discovered new variants of Meltdown and Spectre, dubbed “MeltdownPrime” and SpectrePrime”. MeltdownPrime and SpectrePrime have a similar accuracy to their original…
  • “Crowdsourcing Cyber Threat Defense”
    418 Intelligence Corporation, a cybersecurity company based in Herndon, VA, was awarded $350,000 by the Department of Homeland Security in support of developing a game-based cybersecurity forecasting system. The platform will be used by organizations to…
  • "To Prevent Cyberattacks, Agency Similar to National Transportation Safety Board Suggested"
    Indiana University research recommends the establishment of a National Cybersecurity Safety Board similar to the National Transportation Safety Board in regards to its approach to investigation. Researchers have emphasized the need to create an…