News
-
"CESER Supports DOE's $38 Million Funding Opportunity to Secure the Grid of the Future"The US Department of Energy (DOE) recently announced a $38 million funding opportunity for National Laboratories in support of critical research and development priorities regarding developing an electricity grid that provides secure, resilient, flexible…
-
"Thermal Cameras and Machine Learning Combine to Snoop Out Passwords"A team of researchers at the University of Glasgow published a paper describing their method, ThermoSecure, which discovers passwords and PINs. ThermoSecure involves using a combination of thermal imaging technology and Artificial Intelligence (AI) to…
-
"KillNet: We Are Now a Private Military Corporation"KillNet, the pro-Russian hacker group notorious for launching Distributed Denial-of-Service (DDoS) attacks, will offer its services to private and state sponsors, according to Killmilk, the group's leader. "KillNet's altruism has come to an end," the…
-
"(ISC)2 Urges Countries to Strengthen Collaboration on Cybersecurity Regulation"According to (ISC)², as cybersecurity policies and regulations evolve rapidly worldwide, greater collaboration is necessary to ensure more robust and resilient frameworks to support shared learning and best practices. The international…
-
"New ‘Atomic macOS Stealer’ Malware Offered for $1,000 Per Month"Security researchers at Cyble have revealed that a new piece of macOS malware named Atomic macOS Stealer, or AMOS, appears to provide a wide range of data theft capabilities, targeting passwords, files, and other types of information. The…
-
"Google Goes After CryptBot Distributors"Google has recently revealed details of a new legal campaign to pursue the operators of prolific information-stealing malware, which has so far infected an estimated 670,000 computers. Google launched a civil case against several of CryptBot’s…
-
"Using Quantum Physics to Secure Wireless Devices"The security of communication between wireless devices, such as access cards, key fobs, Bluetooth speakers, and more, is essential to maintaining privacy and preventing theft. However, these tools are not foolproof, and it is becoming easier to find…
-
"Microsoft Blames Clop Affiliate for PaperCut Attacks"Microsoft has recently claimed that recent attacks exploiting two vulnerabilities in the PaperCut print management software are likely the result of a Clop ransomware affiliate. The two bugs in question are CVE-2023–27350, a critical…
-
"RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts"The threat actors behind RTM Locker have a new ransomware strain capable of infecting Linux systems. Uptycs stated in a new report that the locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by the leaked source code of the…
-
"CISOs Struggle to Manage Risk Due to DevSecOps Inefficiencies"According to Dynatrace, as hybrid and multi-cloud environments become more complex and teams continue to rely on manual processes that make it easier for vulnerabilities to enter production environments, it becomes more difficult for CISOs to keep…
-
"Tencent QQ Users Hacked in Mysterious Malware Attack, Says ESET"The Chinese Advanced Persistent Threat (APT) hacking group known as Evasive Panda is linked to an attack that distributed the MsgBot malware as part of an automatic update for the Tencent QQ messaging app. Since 2012, the cyberespionage group Evasive…
-
"Metaverse Version of the Dark Web Could Be Nearly Impenetrable"In the coming years, as the metaverse takes shape, many security issues plaguing cyberspace will also begin to affect virtual space. One of the threats will be the emergence of a new "darkverse," where criminals will be able to operate with greater…