News
-
"IRS Leaks 120,000 Taxpayers' Personal Details"The US Internal Revenue Service (IRS) accidentally posted sensitive taxpayer data to its site, potentially putting those affected at risk of follow-on fraud. The IRS noted that the problem stemmed from the machine-readable (XML) Form 990-T. …
-
"TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor Attacks"Cybersecurity researchers have detailed a previously unknown software control panel used by TA505, a financially motivated threat group. According to the Swiss cybersecurity firm PRODAFT, the group often changes its malware attack strategies in response…
-
"Samsung Reveals New US Data Breach"Samsung recently reported that an unspecified number of Samsung customers in the US had their personal information accessed by an unauthorized user in late July. The Korean electronics giant said it discovered the incident around August 4. It…
-
"Malicious Malware SharkBot Returns to Google Play to Steal Users' Credentials"SharkBot malware, which targets Android users' banking credentials via apps with tens of thousands of downloads, has returned to the Google Play Store. Two Android apps submitted to Google's automated review contained no dangerous code but included…
-
"Hackers Using Instagram Verification Program to Steal Personal Data"According to a new report from Vade, hackers with IP addresses in Turkey have been abusing Instagram's verification process to steal sensitive information from unsuspecting users. Victims have received phishing emails from an "ig-badges" email account…
-
"New Cyber Intelligence Program Prepares Students for Battlefield of the Future"On August 1, Jack Sadle became the first University of South Carolina student to receive a Bachelor of Science in cyber intelligence, a field in which cyber and national security issues intersect. Sadle worked on a project that investigated potential…
-
"Hacker Discovers How to Remotely Pwn a Game Boy Using 'Pokémon Crystal' After 22 Years"Nintendo released an adapter in January 2001 that enabled Game Boy Color owners to play Pokémon online. Xcellerator, an independent security researcher, has now discovered a way to hack into another player's Game Boy 22 years later by exploiting a bug in…
-
"SMBs Finally Investing More in Cybersecurity"A survey conducted by ConnectWise to which 700 IT and business decision-makers responded revealed that most small-to-medium-sized businesses (SMBs) plan to increase cybersecurity investments over the next 12 months, despite two-thirds of respondents…
-
"Addressing the Cybersecurity Talent Gap: New Programs From (ISC)2"The global cybersecurity nonprofit organization (ISC)2 has announced three new initiatives to address the cybersecurity workforce gap, combat burnout among existing cyber talent, and enable businesses to stay ahead of hackers. According to the most…
-
"NIST to Launch New Guidance on Security Risks of Telehealth and Smart Home Integration"The National Institute of Standards and Technology (NIST) has completed the final product description to guide the intersection of telehealth offerings and smart home devices. In new guidance dubbed "Mitigating Cybersecurity Risk in Telehealth Smart Home…
-
"Traffers Threat: The Invisible Thieves"Traffers, also known as "workers," are cybercriminals who redirect Internet users' network traffic to malicious content that they operate, which is usually malware. Traffers typically work in teams to compromise websites to hook traffic and direct it to…
-
"A Windows 11 Automation Tool Can Easily Be Hijacked"Security researcher Michael Bargury, cofounder and CTO of the security firm Zenity, discovered a way to use Microsoft's software automation tool to send ransomware to connected machines and steal data from devices. The attack uses the automation tool as…