News
-
"Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files"A cybersecurity researcher named Micahel Heinzl has recently discovered a total of seven high-severity remote code execution vulnerabilities in Horner Automation’s Cscape product, and they can all be exploited using malicious font files. Horner…
-
"Award-Winning Research Paves the Way for Provably-Safe Sandboxing Using WebAssembly"In the realm of computer programming, developers face the challenge of using untrusted code safely. For example, libraries and frameworks help coders avoid tedious and redundant work, but using code from unverified sources can be dangerous without the…
-
"Linn-Mar School Staff Information Compromised in Cybersecurity Breach"Recently Linn-Mar Community School District discovered that staff names and Social Security numbers may have been stolen in a cybersecurity breach over the summer. The district identified unusual activity on its systems around July 31st. The…
-
"High-Value Targets: String of Aussie Telco Breaches Continues"A third Australian telecommunications company has now disclosed that it was breached. This time, it is Dialog, a provider of information technology services with a sizable market share of Australian customers in both the public and private sectors. This…
-
"Nobel-Winning Quantum Weirdness Undergirds an Emerging High-Tech Industry, Promising Better Ways of Encrypting Communications and Imaging Your Body"Unhackable communications devices, high-precision GPS, and high-resolution medical imaging all rely on the non-intuitive quantum phenomenon of entanglement. Two quantum particles, such as atoms or photons, can become entangled in which a property of one…
-
"A New Wave of PayPal Invoice Scams Using Crypto Disguise"Security researchers at Trend Micro have found a new wave of PayPal invoice scams using blockchain/cryptocurrency-related businesses as their disguise. The researchers discovered the scams on October 09, 2022. The researchers noted that while…
-
"Digital Identity Holds Key to Boosting Cyber Posture, Officials Say"The continued development of digital identity concepts could help organizations improve cybersecurity and mitigate various security risks, according to officials from the federal government and Capitol Hill. Tim Weiler, economic policy advisor and…
-
"Internet Disruptions, Cyberattacks Hit Ukraine Following Russian Missile Strikes"Ukraine's Internet and mobile communications were disrupted due to Russian missile strikes that caused widespread power outages. According to Cloudflare data, Internet availability in the country was 35 percent lower than usual. Authorities have asked…
-
"Cancer Testing, Diagnostics Lab Suffers Phishing Attack, 244K Impacted"Cytometry Specialists, also known as CSI Laboratories, revealed a phishing attack that affected 244,850 people. On July 8, CSI discovered a compromised employee email account. CSI stated that after discovering the incident, it took steps to isolate the…
-
"Extensive LofyGang Hacking Group Targets Credit Card, Disney+, Minecraft, Discord Credentials"LofyGang, a newly discovered threat group, has been conducting various hacking operations since its start more than a year ago. According to a Checkmarx report, more than 200 malicious packages with thousands of installations have been linked to LofyGang…
-
"Microsoft Teams: A Channel for Sensitive Business Information Sharing That Needs Better Backup"Hornetsecurity discovered an urgent need for increased backup for Microsoft Teams, with 45 percent of users often sending confidential and critical information via the platform. According to research commissioned by the company, the often-overlooked need…
-
"Toyota Discloses Accidental Leak of Some Customers' Personal Information"Toyota Motor Corporation is warning customers that their personal information may have been inadvertently exposed after an access key was made public on GitHub for nearly five years. The automaker recently discovered that a portion of its T-Connect site…