News
-
"Post-quantum Cybersecurity Threats Loom Large"According to new research from Zapata Computing, the quantum computing market is maturing with widespread, worldwide interest and increased urgency in addressing post-quantum cybersecurity threats. Seventy-one percent of quantum-adopting companies…
-
"Java, .NET Developers Prone to More Frequent Vulnerabilities"According to the software-testing firm Veracode, over three-quarters of Java and .NET applications contain at least one vulnerability from the OWASP Top 10, a list of software flaws commonly used by developers as a baseline for application security. In…
-
"Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware"Researchers have discovered that threat actors can exploit a legitimate GitHub Codespaces feature to distribute malware to target systems. GitHub Codespaces is a cloud-based customizable development environment that allows users to debug, maintain, and…
-
"CircleCI Confirms Data Breach Was Caused By Infostealer on Employee Laptop"Continuous integration and delivery platform CircleCI has recently confirmed that a data breach that occurred on January 04, 2023, was caused by an infostealer being deployed on an employee's laptop. The company noted that they learned that an…
-
"Qbot Overtakes Emotet in December 2022's Most Wanted Malware List"According to security researchers at Check Point, the Qbot Trojan overtook Emotet as the most prevalent malware found in the wild in December 2022, impacting 7% of organizations worldwide. Additionally, the Glupteba malware, a blockchain-enabled…
-
"Website of Canadian Liquor Distributor LCBO Infected With Web Skimmer"Canadian liquor distributor Liquor Control Board of Ontario (LCBO) has recently announced that a web skimmer injected into its online store was used to steal users’ personal data. One of the largest liquor sellers in Canada, LCBO retails and…
-
"Hack the Pentagon 3.0 Bug Bounty Program to Focus on Facility Control Systems"The US Department of Defense (DoD) is getting ready to launch the third installment of its "Hack the Pentagon" bug bounty program, which will focus on the Facility Related Controls System (FRCS) network. Hack the Pentagon was first launched in 2016…
-
"Hackers Hijack NortonLifeLock Customer Accounts"NortonLifeLock has recently told some customers that malicious third parties have likely accessed their accounts, potentially even reaching their password vaults. The data breach notification sent out by the company stated that hackers have likely…
-
"Improving System Verification"When users launch an application on their computer, they expect that it will work without issues. However, ensuring that systems function properly is more difficult than most think. With many lines of code, a single programming error could cause various…
-
Science of Security and Privacy Annual Reports ArchiveThe reports highlight the progress and accomplishments of the Science of Security and Privacy initiative.
-
"Phishing for Billions: When Accuracy isn't Enough"Users are still hesitant to use security software that can identify and delete phishing emails with near-perfect accuracy. Instead, they want to use their own discretion to detect digital deception. In the past decade, phishing attacks have resulted in…
-
"Almost Half of People Think Cyberattackers Shouldn't Be Prosecuted -- Provided They Hand Back Some of Their Proceeds"New research from the cybersecurity company Naoris Protocol reveals that 48 percent of respondents believe cybercriminals who infiltrate computer networks with malicious intent should be paid a portion of the funds they steal and should not be prosecuted…