News
  • "NIST Selects 12 Companies for Implementing Post-Quantum Cryptography"
    Microsoft, Amazon Web Services (AWS), VMware, Cisco Systems, and Samsung are among the 12 companies chosen by the National Institute of Standards and Technology (NIST) to lead the Unites States' transition to cryptographic standards that are immune to…
  • "Justice Department Seizes $500K From North Korean Hackers Who Targeted US Medical Organizations"
    The US Justice Department recently seized approximately half a million dollars that North Korean government-backed hackers had either extorted from US health care organizations or used to launder ransom payments.  The North Korean hackers hit a…
  • "Albanian Government Hit by Massive Cyberattack"
    The Albanian government, over the weekend, was hit with a "massive cyberattack," forcing its websites offline.  In a statement shared with local news outlets, the government blamed the incident on a synchronized "attack from abroad." The National…
  • "New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals"
    Researchers at Ben-Gurion University of the Negev have discovered a new method for leaking information and jumping over air-gaps. The method involves Serial Advanced Technology Attachment (SATA) or Serial ATA cables as a communication medium, thus adding…
  • "Ongoing 'Roaming Mantis' Smishing Campaign Hits Over 70,000 Users in France"
    Security researchers at Sekoia warn that a Chinese threat actor group named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign. The researchers stated that the campaign uses phishing SMS messages…
  • "Russian Hacking Unit Cozy Bear Adds Google Drive to Its Arsenal, Researchers Say"
    Security researchers at Palo Alto Networks’ Unit 42 threat intelligence team found that the state-backed Russian hacking team behind some of the biggest digital intrusions in recent years has been using both Google Drive and Dropbox to deliver malware…
  • "Removing the Blind Spots That Allow Lateral Movement"
    Almost every lateral movement action relies on compromised credentials. According to Expert Insights, credential compromise was responsible for more than 60 percent of all cyberattacks in 2021. Threat actors can obtain credentials from the machines they…
  • "CISA Set to Open London Office"
    The US Cybersecurity and Infrastructure Security Agency (CISA) has recently announced plans to open its first Attaché Office in London later this month.  CISA noted that the office would help improve collaboration between itself, UK government…
  • "Health Sector Suffered 337 Healthcare Data Breaches in First Half of Year"
    In the first half of 2022, trends in healthcare data breaches showed some minor changes, according to Fortified Health Security's mid-year report on the state of healthcare cybersecurity. The Health and Human Services (HHS) Office for Civil Rights data…
  • "Quantum Ransomware Attack on Finance Company Impacts 657 Healthcare Organizations and Millions of Patients"
    Professional Finance Company Inc. (PFC) disclosed that it was the victim of a ransomware attack in February, which impacted more than 600 healthcare organizations. PFC did not disclose the attackers, but cybersecurity researchers suspect the Quantum…
  • "New CloudMensis Malware Backdoors Macs to Steal Victims' Data"
    In a highly targeted series of attacks, unknown threat actors are using previously undetected malware to backdoor macOS devices and exfiltrate information. ESET researchers discovered the new malware in April 2022 and named it CloudMensis as it uses…
  • "User Experience Plays a Critical Role in Cybersecurity"
    Attackers shifted to endpoints when network security was tightened, and systems were secured by technology teams. Now that they are more secure, hackers are focusing on the next security chain's weak link, which is people. According to Stanford…