News
-
"EV Charging Infrastructure Offers an Electric Cyberattack Opportunity"Cyberattackers and security researchers have begun focusing on Electric Vehicle (EV) charging infrastructure security vulnerabilities. Researchers from the energy-network cybersecurity company Saiflow uncovered two vulnerabilities in the Open Charge…
-
"Ransomware Gang Leaks Data Stolen from City of Oakland"The Play ransomware group is leaking data stolen from a recent cyberattack against the City of Oakland, California. The initial data leak consisted of a 10GB RAR archive with multiple parts that contained private documents, employee details, passports,…
-
"Law Enforcement Teams Score Major Win against DoppelPaymer Ransomware Gang"On February 28, 2023, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces to bring down the actors behind the criminal group known for launching attacks using the DoppelPaymer ransomware. In 2019,…
-
"Experts Reveal Google Cloud Platform's Blind Spot for Data Exfiltration Attacks"New research demonstrates that malicious actors can use "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data. The cloud incident response company Mitiga stated that GCP lacks the visibility in its storage logs…
-
"Thought You'd Opted Out of Online Tracking? Think Again"Websites often offer visitors the option to opt out of data collection. However, according to a team of privacy researchers, opting out is not always effective, as visitor data collection can still occur. Europe's General Data Protection Regulation (GDPR…
-
"Financial Apps Tested from Google Play Store Leaked Sensitive API Data under Testing Conditions"Over 90 percent of the 650 financial apps hosted on the Google Play App Store contain data that can be extracted, such as Application Programming Interface (API) keys. Approov's Mobile Threat Lab reverse-engineered the code of financial service apps and…
-
"Auto Cyberattacks Becoming More Widespread"As cars grow in intelligence, sophistication, and connectivity, they become more vulnerable to cyberattacks. The current challenge is to stay ahead of hackers who are constantly looking for new methods for attacking car software and hardware. In 2022,…
-
"Hundreds of Thousands of Websites Hacked as Part of Redirection Campaign"According to the cybersecurity company Wiz, since early September 2022, threat actors have been infiltrating tens of thousands of websites targeting East Asian audiences in order to redirect their users to adult-themed content. The threat actors gained…
-
"Data Breach At College Of The Desert Made Public"Approximately 800 people whose personal data may have been accessed during a cyberattack at College of the Desert will be receiving a formal notification letter with information on additional steps they can take to protect themselves. The college…
-
"Microsoft and MITRE Create Tool to Help Security Teams Prepare for Attacks on Machine Learning Systems"Microsoft and MITRE have developed a plug-in that integrates multiple open-source software tools to better prepare cybersecurity professionals for attacks on Machine Learning (ML) systems. The Arsenal tool implements tactics and techniques defined by the…
-
"In Neural Networks, Unbreakable Locks Can Hide Invisible Doors"Even though image generators such as DALLE 2 and Large Language Models (LLMs) such as ChatGPT are making headlines, experts still do not understand why they are effective, thus making it difficult to know how they could be manipulated. For example,…
-
"HHS Issues Advisory on Clop Data Breach Threat"Recently the Department of Health and Human Services (HHS) published an alert that warned that Russia-linked ransomware group Clop took responsibility for attacking more than 130 organizations, including some in the health industry, using secure file…