News
-
"North Korea Makes 50% of Income from Cyberattacks: Report"The US has recently claimed that the North Korean regime makes around half of its foreign-currency income from cyberattacks on cryptocurrency and other targets. It was noted that the amount of cyberattacks directed by the hermit nation had risen…
-
"Brazilian Cybercriminals Using LOLBaS and CMD Scripts to Drain Bank Accounts"An unknown threat actor has been observed targeting Spanish- and Portuguese-speaking victims in Mexico, Peru, and Portugal to compromise online banking accounts. According to the BlackBerry Research and Intelligence Team, this threat actor uses…
-
"Hackers Hijack Legitimate Sites to Host Credit Card Stealer Scripts"A new Magecart credit card theft campaign uses legitimate websites as "makeshift" command-and-control (C2) servers in order to inject and hide skimmers on targeted eCommerce sites. A Magecart attack occurs when hackers infiltrate online stores and inject…
-
"Virtual Claims Raise Alarms Among Insurance Carriers and Customers"According to LexisNexis Risk Solutions, carriers and customers are becoming increasingly concerned about data privacy as the digital revolution changes the claims process. Over 60 percent of customers are concerned about the security of their personally…
-
"'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft"SMS campaigns targeting residents of the United Arab Emirates (UAE) seek to steal payment and personal information. Previously aimed at Asia-Pacific users, the campaign has been named "PostalFurious" because it impersonates postal services. Group-IB's…
-
"Developing An Unbreakable Cybersecurity System"Researchers are exploring approaches to truly unbreakable security. Cyberattacks are becoming more frequent and sophisticated, and as the amount and value of data continue to increase, the impact of these attacks is growing almost exponentially.…
-
"Taking the Time to Implement Trust in AI"Researchers who value security and privacy have been paying close attention to the rapid development of new Machine Learning (ML) technology. The vulnerabilities of these technological advances and their Artificial Intelligence (AI) applications…
-
"UCCS Student Research Wins Award at USCYBERCOM Research Competition"The US Cyber Command (USCYBERCOM) hosted the inaugural USCYBERCOM Cyber Recon 2023 conference in Maryland from April 19-20, 2023. The Analyst Award was won by a team from UCCS composed of Ph.D. student Mark Maldonado and academic advisor Shouhuai Xu,…
-
"MOVEit Transfer Zero-Day Attacks: The Latest Info"There is new information about the zero-day vulnerability exploited by attackers in Progress Software's MOVEit Transfer solution, as well as patches and helpful instructions for customers. Progress Software has updated the security advisory and confirmed…
-
"TLA+ Helps Programmers Squash Bugs Before Coding"Design is an integral component of the development process for most software engineers. A programmer devises algorithms to support their code and constructs models to visualize how the various parts of their systems will function together, similar to an…
-
"National Internet Safety Month: Together, We Can Make Our K-12 Schools Cybersecure. It's Fundamental."The largest school district in Iowa canceled a day of classes in January due to a cyberattack on their network. The same month, Tucson Unified School District, the largest pre-K-12 school district in southern Arizona, experienced a ransomware attack,…
-
"Google Temporarily Offering $180,000 for Full Chain Chrome Exploit"Google recently announced significantly higher bug bounty rewards for vulnerability reports containing full chain exploits leading to a sandbox escape in Chrome. Until December 1, 2023, the first report to contain a full chain exploit leading to a…