News
-
"Conversational Attacks Fastest Growing Mobile Threat"Security researchers at Proofpoint have warned of a 12-fold increase in reporting of so-called "conversational scams" like pig butchering last year, making them the fastest growing threat to mobile users in 2022. The researchers stated that such…
-
"NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers"The National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), the FBI, and the Cybersecurity and Infrastructure Security Agency (CISA) have collaborated to publish a joint Cybersecurity Advisory (CSA) report on the tactics,…
-
"Final Version of TIC Use Cases Covering Cloud Services"Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Email-as-a-Service (EaaS) have unique security considerations. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (…
-
"Pen Testers Need to Hack AI, but Also Question Its Existence"Samsung has prohibited some uses of ChatGPT, while Ford and Volkswagen have shut down their self-driving car company, and a letter calling for a halt to the training of more powerful Artificial Intelligence (AI) systems has received over 25,000…
-
"Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"MuddyWater, an Iranian threat actor, continues its time-tested practice of using legitimate remote administration tools to seize control of targeted systems. While the nation-state group previously used ScreenConnect, RemoteUtilities, and Syncro, a new…
-
"The Attacks That Can Target Your Windows Active Directory"Active Directory (AD) remains the predominant source of Identity and Access Management (IAM) in the enterprise, making it the target of numerous attacks. There are multiple attack techniques and attack vectors that hackers use to target AD. Different…
-
"Pre-Pandemic Techniques Are Fueling Record Fraud Rates"According to Pindrop, the rise and adoption of Artificial Intelligence (AI), an impending recession, and the return of pre-pandemic fraud techniques are driving record rates of fraud attacks against consumers and businesses. States with restrictions on…
-
"Cyber Intrusion Detection Time at an All-Time Low"Security researchers at Google's Mandiant have found that organizations and their cyber defenders are getting better at detecting cyberattacks, but detection time still stands at 16 days. During the study, the researchers found that 2022 saw a…
-
"Creative Software Maker Affinity Informs Customers of Forum Breach"UK-based photo editing, graphic design, and publishing software developer Affinity recently informed its forum members of a data breach that occurred on April 6. The company said a hacker gained access to forum user data after compromising an…
-
"Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe?"Education technology is now an integral part of the education system. However, there are concerns regarding the readiness of K-12 districts to address the complex privacy and security issues raised by such technology. According to "Uncovering Privacy and…
-
"New Domino Backdoor Malware Linked to Ex-Conti, FIN7 Criminals"Domino Backdoor is a new malware linked by security researchers to former members of the prolific Conti and FIN7 groups. It has been used to launch information-stealing malware, which involves the same techniques and source code as the infamous groups,…
-
"HHS Launches New Cybersecurity Awareness Resources"The Department of Health and Human Services (HHS) has released three new cybersecurity resources, each of which focuses on educating medical institutions on how to better protect their digital infrastructures. Two websites and an online report provide…