News
-
"CISOs Worried About Personal Liability For Breaches"According to security researchers at Proofpoint, over three-fifths (62%) of global CISOs are concerned about being held personally liable for successful cyberattacks that occur on their watch, and a similar share would not join an organization that fails…
-
"Researchers Uncover SideWinder's Latest Server-Based Polymorphism Technique"As part of a campaign that began in late November 2022, the Advanced Persistent Threat (APT) actor known as SideWinder has been using a backdoor in attacks against Pakistani government organizations. According to the BlackBerry Research and Intelligence…
-
"FBI Seizes 13 More Domains Linked to DDoS-For-Hire Services"The US Justice Department (DOJ) has announced the court-ordered seizure of 13 Internet domains associated with Distributed Denial-of-Service (DDoS)-for-hire services, as part of an ongoing initiative against computer attack booter services. This set of…
-
"Finding Bugs in AI Models at DEF CON 31"DEF CON's AI Village will host the first public assessment of Large Language Models (LLMs) to discover bugs and the potential for AI model misuse. There are numerous ways in which LLMs can help users' creativity, but there are also challenges,…
-
"BEC Campaign via Israel Spotted Targeting Large Multinational Companies"An Israel-based threat group is conducting a Business Email Compromise (BEC) campaign primarily against large and multinational companies with an average annual revenue of over $10 billion. According to researchers at Abnormal Security who discovered the…
-
"Applying Blockchain to Digital Advertising"According to a new study from researchers at the University of Georgia, the same blockchain technology that secures cryptocurrency systems could also shield users from intrusive and predatory advertising. Many consumers do not understand how their…
-
"How the ZeuS Trojan Info Stealer Changed Cybersecurity"After infecting a computer or device, information-stealing malware is highly adept at exfiltrating login credentials, financial information, and other confidential data. Typically, information stealers operate by capturing keystrokes, screenshots, and…
-
"CERT-UA Warns of an Ongoing SmokeLoader Campaign"The Computer Emergency Response Team of Ukraine (CERT-UA) warns of an ongoing phishing campaign aimed at distributing the SmokeLoader malware in the form of a polyglot file. Threat actors are sending emails with the subject line "bill/payment" and a ZIP…
-
"Western Digital Confirms Ransomware Group Stole Customer Information"Western Digital recently confirmed that cybercriminals have stolen customer and other information after breaching its systems. According to the digital storage giant, a security breach was discovered on March 26. The company noted that it…
-
"Cryptocurrencies: Shared Irresponsibility"Information Technology security is of utmost importance when using cryptocurrencies. Ultimately, money, like other data, is susceptible to cyberattacks. Professor Ghassan Karame, head of the Chair for Information Security at Ruhr University Bochum, is…
-
"Ransomware Group Claims Attack on Constellation Software"The Alphv/BlackCat ransomware group has recently claimed responsibility for a cyberattack that Canadian software company Constellation Software disclosed last week. Toronto-based Constellation Software is a company specializing in the acquisition…
-
"Cookie Consent Banners Need Improvement, May Not Be the Answer"Cookie consent banners appear, in some form, on nearly every website, but concerns remain as to whether users understand what they agree to when they select one of the available options or click the x button to close the banner. In order to comply with…