News
-
"Hacker Discovers How to Remotely Pwn a Game Boy Using 'Pokémon Crystal' After 22 Years"Nintendo released an adapter in January 2001 that enabled Game Boy Color owners to play Pokémon online. Xcellerator, an independent security researcher, has now discovered a way to hack into another player's Game Boy 22 years later by exploiting a bug in…
-
"SMBs Finally Investing More in Cybersecurity"A survey conducted by ConnectWise to which 700 IT and business decision-makers responded revealed that most small-to-medium-sized businesses (SMBs) plan to increase cybersecurity investments over the next 12 months, despite two-thirds of respondents…
-
"Addressing the Cybersecurity Talent Gap: New Programs From (ISC)2"The global cybersecurity nonprofit organization (ISC)2 has announced three new initiatives to address the cybersecurity workforce gap, combat burnout among existing cyber talent, and enable businesses to stay ahead of hackers. According to the most…
-
"NIST to Launch New Guidance on Security Risks of Telehealth and Smart Home Integration"The National Institute of Standards and Technology (NIST) has completed the final product description to guide the intersection of telehealth offerings and smart home devices. In new guidance dubbed "Mitigating Cybersecurity Risk in Telehealth Smart Home…
-
"Traffers Threat: The Invisible Thieves"Traffers, also known as "workers," are cybercriminals who redirect Internet users' network traffic to malicious content that they operate, which is usually malware. Traffers typically work in teams to compromise websites to hook traffic and direct it to…
-
"A Windows 11 Automation Tool Can Easily Be Hijacked"Security researcher Michael Bargury, cofounder and CTO of the security firm Zenity, discovered a way to use Microsoft's software automation tool to send ransomware to connected machines and steal data from devices. The attack uses the automation tool as…
-
"US Police Deployed Obscure Smartphone Tracking Tool With No Warrants"Researchers at the Associated Press (AP) discovered that various law enforcement agencies in Southern California and North Carolina have deployed an obscure cellphone tracking tool dubbed "Fog Reveal," sometimes without search warrants. The…
-
"CVSS Vulnerability Scores Can Be Misleading: Security Researchers"During a new study, security researchers at Flashpoint analyzed 11,860 vulnerabilities in the first six months of 2022. The researchers stated that vulnerability management systems based on the Common Vulnerability Scoring System (CVSS) v2 scoring…
-
"Neopets Hackers Had Network Access for 18 Months"Neopets, a game that lets players create and care for virtual pets inside a fantasy world, has released an "Important Announcement" urging its members to update their passwords and confirming that the company's IT systems were compromised. The…
-
"Ghost Data Increases Enterprise Business Risk"Security researchers at Cyera stated that cloud sprawl is a big issue for organizations, with business teams using cloud systems and services on their own, often without IT oversight. That leads to cloud data sprawl as data is scattered across…
-
"Threat Actor Phishing PyPI Users Identified"A previously unknown group dubbed "JuiceLedger" has been identified as the threat actor behind a recent phishing campaign specifically targeting users of the Python Package Index (PyPI). The threat actor first appeared earlier this year and is focused on…
-
"Researcher Unveils Smart Lock Hack for Fingerprint Theft"A paper recently published by James Cook University Singapore describes how an attacker could covertly harvest fingerprints using off-the-shelf hardware through a smart lock hack technique called droplock. According to author and senior cybersecurity…