News
  • "Regulators Warn of Man-in-the-Middle Attack Risks"
    Federal regulators are alerting healthcare sector entities about how some of the end-to-end security products being utilized in their systems, could be vulnerable to man-in-the-middle attacks. This warning also applies to Secure Hypertext Transport…
  • "Hackers are attacking Word users with new Microsoft Office zero-day vulnerability"
    Security researchers at McAfee have recently discovered a vulnerability in Microsoft Word that could be exploited by hackers to stealthily launch different types of malware even on computers that are fully patched. All versions of Microsoft Office are…
  • "Hard-coded passwords put industrial systems at risk"
    Researchers from German firm OpenSource Security have revealed that SCADA has been distributing products with passwords embedded within the firmware which is also unchangeable. Hard-coding passwords into a system poses serious risks for connected…
  • "Driver privacy can be compromised in usage-based insurance systems"
    Researchers at Ben-Gurion University of the Negev have discovered the possibility of an attacker compromising private information about a driver including their location, home address, work address, and more via Usage-Based Insurance program’s cloud…
  • "IoT Botnet 'Amnesia' Hijacks DVRs via Unpatched Flaw"
    A new Linux/IoT botnet by the name of "Amnesia" has been discovered to target digital video recorders and other embedded systems manufactured by China-based TVT Digital. This botnet exploits a vulnerability in remote code execution to identify and…
  • "McAfee report reveals five challenges to cyber threat intelligence"
    McAfee Labs has released a new report that outlines critical challenges in conjunction with sharing or exchanging intelligence about emerging cyber threats within the security industry along with notable trends associated with malware, ransomware, and…
  • "Privacy rollback can cause headaches for corporate security pros"
    After recent congressional decisions to pull privacy regulations taming ISPs, the use of Tor and other means of hiding user identity on the internet has already increased dramatically. In turn, company security analysts must do additional security…
  • "New Malware Intentionally Bricks IoT Devices"
    A new malware by the name of “BrickerBot” has emerged to infiltrate and disable Internet of Things (IoT) devices by destroying and reconfiguring storage capabilities and kernel parameters of targeted devices. Radware discovered this malware through their…
  • "South Korean users targeted with a new stealthy malware, the ROKRAT RAT"
    A new malware has emerged to target South Korean users as discovered by security experts at CISCO Talos. This malware has been dubbed the “ROKRAT RAT”, a stealthy remote access tool that specifically targets Korean users through a popular Korean word…
  • "U.S. trade group hacked with Chinese software ahead of Xi summit"
    Researchers at Fidelis Cybersecurity have discovered a malicious link placed on National Foreign Trade Council (NFTC) event registration web pages by a sophisticated hacking group supposedly in pursuit of Chinese government interests.  The NFTC is a…
  • "Honeywell Launches New Industrial Cyber Security Solution To Enable Secure Use Of USB Devices"
    Honeywell Process Solutions has announced a new solution to protect computer systems against USB-borne threats through Secure Media Exchange (SMX). This solution has been developed by Honeywell to perform security measures without affecting productivity…
  • "UEFI flaws can be exploited to install highly persistent ransomware"
    Security researchers from Cylance have discovered ways in which an attacker can exploit the vulnerabilities of a motherboard’s Unified Extensible Firmware Interface, also known as the modern BIOS, to run ransomware programs. These vulnerabilities have…