News
  • "Zero-Trust Architecture May Hold the Answer to Cybersecurity Insider Threats"
    An MIT Lincoln Laboratory study explored the implementation of zero-trust security, a cybersecurity approach that requires users to prove their authenticity every time they access data or a network application. The goals of the study were to review the…
  • "Cryptography Security Enhanced Through Zero-Knowledge Schemes"
    Dr. Yupeng Zhang, assistant professor in the Department of Computer Science and Engineering at Texas A&M University, has received the National Science Foundation's (NSF) Faculty Early Career Development (CAREER) Award for his research project focused…
  • "Personal Information of Nearly Two Million Texans Exposed"
    The personal information of nearly two million Texans was exposed for almost three years due to a programming issue at the Texas Department of Insurance (TDI).  The department revealed that details of 1.8 million workers who have filed compensation…
  • "U.S. Warns of North Korean Hackers Posing as IT Freelancers"
    The U.S. Department of State, the U.S. Department of the Treasury, and the Federal Bureau of Investigation, recently warned that organizations should be careful when employing IT freelancers because they may be hiring North Korean hackers. North Korean…
  • "AcidRain Malware Shuts Down Thousands of Modems in Ukraine"
    According to a recent Viasat report, a cyberattack rendered Viasat KA-SAT modems nonfunctional throughout Ukraine on February 24. As a result of the attack, remote monitoring and control of 5,800 Enercon wind turbines in Germany were disabled. A recently…
  • "Over 380,000 Kubernetes API Servers Exposed to Internet: Shadowserver"
    The Shadowserver Foundation, a nonprofit cybersecurity organization, has started scanning the internet for Kubernetes API servers and found roughly 380,000 that allow some form of access. Shadowserver is conducting daily scans of the IPv4 space on ports…
  • "APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack 0-Days"
    A study conducted by researchers at the University of Trento in Italy calls on organizations to prioritize existing vulnerabilities to mitigate the risk of compromise. Their research found that most Advanced Persistent Threat (APT) groups exploit known…
  • "Digital Skimming is Now the Preserve of Non-Magecart Groups"
    According to new research at RiskIQ, less than a fifth of digital skimming activity at the start of the year was linked to Magecart groups, as cheap tools lowered the barrier to entry for less sophisticated cybercriminals.  Researchers analyzed the…
  • "Western Allies Warn of Top Cyberattack Mistakes"
    The security agencies of five countries have outlined 10 of the most common ways threat actors compromise their victims, most of which can be mitigated by basic cyber-hygiene best practices. Cybersecurity authorities of the US, Canada, New Zealand, the…
  • "Large-Scale Attack Targeting Tatsu Builder WordPress Plugin"
    Security researchers have found that tens of thousands of WordPress websites are potentially at risk of compromise as part of an ongoing large-scale attack targeting a remote code execution vulnerability in the Tatsu Builder plugin.  The…
  • "FBI: Hackers Used Malicious PHP Code to Grab Credit Card Data"
    The Federal Bureau of Investigation (FBI) has issued a warning pertaining to a malicious actor stealing credit card information from the checkout pages of US firms' websites. According to the FBI, unidentified cyber actors scraped credit card data from a…
  • "Weak Security Controls and Practices Routinely Exploited for Initial Access"
    Cyber actors commonly use misconfigured or unsecured security configurations, weak controls, and other bad cyber hygiene practices to gain initial access or compromise a victim's system. A joint Cybersecurity Advisory co-authored by the cybersecurity…