News
-
"MFA Fatigue: Hackers' New Favorite Tactic in High-Profile Breaches"Hackers are increasingly using social engineering attacks to gain access to corporate credentials and infiltrate large networks. As the use of multi-factor authentication (MFA) continues to grow, a technique called MFA Fatigue is growing more popular.…
-
"Emotet Botnet Started Distributing Quantum and BlackCat Ransomware"Ransomware-as-a-Service (RaaS) groups such as Quantum and BlackCat are now using the Emotet malware. Emotet began as a banking Trojan in 2014, but updates added to it have transformed it into a highly potent threat capable of downloading other payloads…
-
"Phishing Attacks Targeting US Government Have Evolved in Sophistication, Confense Reports"Phishing attacks on the US Departments of Labor, Commerce, and Transportation have become more convincing and evasive, according to Confense Intelligence. The credential phishing campaigns, which have been active since mid-2019, have been observed in…
-
"DoD Cyber Crime Center, US Cyber Command Develop Interagency Collaboration"The Department of Defense (DoD) Cyber Crime Center (DC3) Operations Enablement Directorate (OED) and the US Cyber Command (USCC) have formed an interagency collaborative partnership to strengthen efforts supporting national security matters with a…
-
"New Model Provides Smishing Protection in Swahili"Smishing (SMS phishing) extends scams to mobile devices by sending text messages impersonating organizations, such as banks, in order to obtain victims' personal information. Smishing is a major cybersecurity concern in Africa, which has the world's…
-
"Pen Testing Data Highlights Gaps in Healthcare Cybersecurity"Penetration testing is an important tool for maintaining healthcare cybersecurity and identifying potential security vulnerabilities. Although healthcare is gradually transitioning away from reliance on legacy systems, unpatched and out-of-date software…
-
"EZVIZ Video Cameras Can Be Accessed Remotely"Bitdefender researchers discovered a series of vulnerabilities that could be exploited to remotely control EZVIZ networked cameras without authentication to download and decrypt images. The researchers were able to take control the EZVIZ cameras using a…
-
"EFF's 'Cover Your Tracks' Will Detect Your Use of iOS 16's Lockdown Mode"Apple's new iOS 16 provides a powerful tool called Lockdown Mode for the company's most vulnerable users. Lockdown Mode restricts attackers' ability to hack into users' phones by disabling commonly exploited features. While this new feature provides a…
-
"Rockstar Confirms Hacker Stole GTA VI Footage"Rockstar Games, an American video game publisher, has confirmed that a hacker published authentic, pre-release footage from the development of Grand Theft Auto (GTA) VI, a highly anticipated upcoming game. According to a statement released by the company…
-
"Can Reflections in Eyeglasses Actually Leak Info From Zoom Calls? Here's a Study Into It"Researchers at the University of Michigan and Zhejiang University have brought attention to how video conferencing participants wearing glasses inadvertently reveal sensitive on-screen information due to reflections in their eyeglasses. The researchers…
-
"Ransomware Attack Frequency and Amount Demanded Down in H1 2022"According to a new report from Coalition, ransomware attack frequency and cost have decreased. From H2 2021 to H1 2022, ransomware payment demands fell from $1.37 million to $896,000. Coalition policyholders paid around 20 percent of the initial amount…
-
"High Severity Vulnerabilities Found in Harbor Open-Source Artifact Registry"Oxeye security researchers have discovered a number of new high severity Insecure Director Object Reference (IDOR) vulnerabilities in the Cloud Native Computing Foundation (CNCF)-graduated project Harbor, VMware's popular open-source artifact registry.…