News
-
"Cisco Addressed Several High-Severity Flaws in Its Products"Cisco has patched several vulnerabilities in some of its products, including critical flaws in identity, email, and web security products. The most severe flaw addressed by Cisco is a Cross-Site Request Forgery (CSRF) flaw, tracked as CVE-2022-20961 (…
-
"Attackers Leverage Microsoft Dynamics 365 to Phish Users"According to Avanan researchers, attackers are using Microsoft Dynamics 365 Customer Voice to circumvent email filters and deliver phishing emails into Microsoft users' inboxes. Microsoft Dynamics 365 is an Enterprise Resource Planning (ERP) and Customer…
-
"LockBit Ransomware Claims Attack on Continental Automotive Giant"The LockBit ransomware gang has claimed responsibility for a cyberattack on Continental, a German multinational automobile group. LockBit also claims to have stolen data from Continental's systems and threatens to publish it on their data leak website if…
-
"CISA Warns of Critical Vulnerabilities in 3 Industrial Control System Software"The US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has issued three Industrial Control Systems (ICS) advisories regarding multiple vulnerabilities in software from ETIC Telecom, Nokia, and Delta Industrial…
-
"GitHub Flaw Underscores Risks of Open Source, RepoJacking"A GitHub vulnerability was discovered to enable attackers to take control of a GitHub repository and infect all applications and code that rely on it with malicious code. This vulnerability serves as a warning to those who rely on open-source packages,…
-
"Waterloo Researchers Discover Security Loophole Allowing Attackers to Use Wi-Fi to See Through Walls"A team of researchers from the University of Waterloo has created a drone-powered device that can see through walls using Wi-Fi networks. The Wi-Peep device can fly close to a building and then use the Wi-Fi network to identify and locate all Wi-Fi-…
-
"Post-Quantum And Pre-Quantum Security Issues Grow"General-purpose quantum computers will be capable of cracking the codes that protect much of the world's information. Although these machines do not fully exist yet, governments and businesses are already planning for post-quantum encryption. The task is…
-
"Ransomware: Not Enough Victims Are Reporting Attacks, and That's a Problem for Everyone"Ransomware remains a significant cyber threat to businesses and the general public, but it is difficult to determine the true scope of attacks because many victims are not reporting them. The warning came from the National Cyber Security Centre's (NCSC)…
-
"UK Health System Email Accounts Hijacked to Steal Microsoft Logins"According to the email security firm INKY, 139 employees of the National Health Service (NHS) in the UK were victims of account takeover in the previous year. The attack began with the threat actors gaining access to legitimate NHS email accounts. They…
-
"International Counter Ransomware Initiative 2022 Joint Statement"The International Counter Ransomware Initiative (CRI), which includes the UK, US, Ukraine, Australia, Austria, Belgium, Brazil, Bulgaria, Canada, and others, met in Washington, DC, from October 31 to November 1, 2022. Members reaffirmed their commitment…
-
"The Surprising Relationship Between Bitcoin and Ransomware Is Investigated in White House Summit"Bitcoin has brought many advantages, including accessibility, liquidity, anonymity, independence from central authority, and high-return potential. However, these are benefits to cybercriminals as well, particularly those operating across national…
-
"$28 Million Stolen From Cryptocurrency Platform Deribit"Deribit, a cryptocurrency derivatives platform, has confirmed that a hacker stole $28 million from the company, forcing it to suspend withdrawals while investigating the incident. Deribit is a Panama City-based cryptocurrency futures and options exchange…