-
"COMMA Project Explores How Cybersecurity Affects Business Relationships and Risk Experiences"Data connectivity requires cybersecurity and safety for mobile work machines used in mining, port logistics, forestry, and more. Turku School of Economics (TSE) began a two-year research project aimed at developing new cybersecurity services for machine…
-
"Privacy Advocates Want the FTC to Take On Invasive Daycare Apps"The Electronic Frontier Foundation (EFF) urges the Federal Trade Commission (FTC) to investigate privacy and security concerns with daycare and early education apps. A letter sent to the FTC by the EFF builds on the research conducted by Alexis Hancock,…
-
"Hackers Backdoor Pirated Windows OS With Cryptominer and Xtreme RAT"Security researchers at eSentire's Threat Response Unit (TRU) have discovered that Xtreme RAT and Cryptominer have been delivered through pirated copies of the Windows operating system (OS) software. The researchers noted that several malicious…
-
"Reverse DNS Queries May Reveal Too Much, Computer Scientists Argue"Computer scientists at the University of Twente in the Netherlands discovered that the interaction between the Internet and local networks could be examined to reveal private data and support tracking. They examined how the Domain Name System (DNS)…
-
"Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several Countries"Security researchers at Microsoft Threat Intelligence Center (MSTIC) discovered that threat actors associated with North Korea have been weaponizing legitimate open–source software targeting employees in organizations across multiple industries. …
-
"Using Quantum Technologies to Make Communications Secure"Projects led by scientists in the North Atlantic Treaty Organization (NATO) and partner countries aim to use the power of quantum technology to make communications unhackable. The use of quantum technologies in the security and defense sectors could help…
-
"Federal Agencies Face Cloud Cybersecurity Challenges"Federal agencies are planning to spend billions of dollars each year to support their IT and cybersecurity efforts, which will include migrating IT resources to secure, cost-effective commercial cloud services. Cloud computing allows agencies to access…
-
"Microsoft Confirms Exploitation of Two Exchange Server Zero-Days"Microsoft has confirmed that it’s aware of two Exchange Server zero-day vulnerabilities that have been exploited in targeted attacks and are currently working on patches. GTSC, a cybersecurity company based in Vietnam, reported seeing attacks…
-
"Semiconductor Industry Faced 8 Attacks From Ransomware Groups, Extortion Gangs in 2022"In 2022, several of the world's leading semiconductor companies were targeted with ransomware attacks, extortion attempts, and other malicious activity. Recorded Future has published a report outlining eight different cyberattacks on semiconductor firms…
-
"DoD Announces Final Results of 'Hack US' Bug Bounty Program"The US Department of Defense (DoD) and HackerOne recently announced the results of the Hack US one-week bug bounty challenge that ran from July 4 to July 11, 2022. The DoD announced it was offering a total bounty pool of $110,000, representing $75,…
-
"Arctic Wolf: One-Third of All Cyberattacks Now Involve Business Email Compromise"Arctic Wolf Networks released a report finding that there has been a significant increase in Business Email Compromise (BEC) attacks in the first half of this year. According to data analysis and insights from Arctic Wolf's incident response unit Tetra…
-
"Capital One Phish Showcases Growing Bank-Brand Targeting Trend"Security researchers at Vade have discovered a recent phishing campaign exploiting Capital One's new partnership with verification service Authentify, sending thousands of scam emails to the bank's customers to try and trick them into uploading images of…
News