News
-
"Malicious Python Package Uses Unicode Support to Evade Detection"Researchers at the supply chain security company Phylum discovered a malicious Python package on the Python Package Index (PyPI) repository that uses Unicode to avoid detection and deploy information-stealing malware. On March 15, 2023, the onyxproxy…
-
"New BEC Tactics Enable Fake Asset Purchases"According to the FBI, corporate sellers of IT, agricultural, and other goods should beware of business email compromise (BEC) scammers trying to get hold of their assets without paying. The FBI noted that these attacks begin in the same way as many…
-
"Latitude Financial Admits Breach Impacted Millions"Latitude Financial has recently revealed that a cyberattack earlier this month resulted in the theft of over 14 million customer records, including sensitive personal information. The Melbourne-headquartered consumer lender said in a statement that…
-
"OpenAI: Payment Info Leaked during ChatGPT Outage"During a recent ChatGPT outage, a small percentage of ChatGPT Plus users may have had their payment information compromised, according to OpenAI. Some users were able to see another active user's first and last name, email address, payment address, the…
-
"Understanding Adversaries through Dark Web Intelligence"According to Searchlight Cyber, 93 percent of CISOs are concerned about dark web threats, and around 72 percent say that intelligence on cybercriminals is "critical" to defending their company and enhancing cybersecurity. In addition, according to the…
-
"New Dark Power Ransomware Claims 10 Victims in Its First Month"Dark Power, a new ransomware operation, has already listed its first victims on a dark web data leak site, threatening to release their data if a ransom is not paid. The encryptor used by the ransomware gang has a compilation date of January 29, 2023,…
-
"Tesla Model 3 Hacked in Less Than 2 Minutes at Pwn2Own Contest"Hackers from the France-based penetration testing company Synacktiv recently demonstrated two different Tesla Model 3 exploits at the Pwn2Own hacking contest in Vancouver. The attacks granted them extensive access to subsystems controlling the safety and…
-
"New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords"A new information-stealing malware has targeted Apple's macOS operating system in an effort to steal sensitive data from infected devices. MacStealer is the latest example of malware distribution that involves Telegram as a command-and-control (C2)…
-
"Kids Tech Camp iD Tech Still Silent Weeks After Data Breach"Parents are still looking for answers weeks after hackers stole the personal data of thousands of users from kids' tech coding camp iD Tech. Many parents fear their children's data was compromised during the data breach. iD Tech, which…
-
"Student Hackers Take Control, Learn How to Protect Transportation Infrastructure"Jake Jepson, a master's student in the Department of Systems Engineering at Colorado State University, is aware of how vulnerable cars can be because he and his peers practice taking control of them via cyberattacks. Jepson is a member of the Systems…
-
"Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform"Intel recently announced the latest version of its vPro platform for the newly launched 13th Gen Core processors, claiming that it significantly improves security. The vPro platform is designed to enhance performance, security, manageability, and…
-
"Computer Engineering Research Prompts Bug Fixes, Updates to Major GPU Frameworks"Graphical Processing Units (GPUs) are the driving force behind some of the most important topics in computer science today, including Artificial Intelligence (AI) and Machine Learning (ML). When major technology companies build their own GPUs for use in…