News
  • "How the FBI Recovered Bitcoin Ransom Paid to Darkside Ransomware Gang"
    FBI recovers a chunk of the BITCOIN Ransom paid for the Colonial Pipeline ransom attack. The victim contacted the FBI and then agreed to pay the ransom. The FBI was able to track the origin back to a hacking group called Darkside. They followed the…
  • "60% of Businesses Would Consider Paying a Ransomware Demand"
    A new study by researchers at Neustar International Security Council (NISC) surveyed 304 senior professionals across six EMEA and US markets. The researchers found that three in five (60%) of organizations would consider paying an extortion demand in the…
  • "Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet"
    Thousands of VMware vCenter Servers, containing two recently disclosed critical vulnerabilities, are still publicly accessible on the Internet three weeks after the company called on organizations to patch the flaws. The exploitation of the…
  • "IoT Supply Chain Bug Hits Millions of Cameras"
    Security experts from Nozomi Networks have warned of a critical IoT supply chain vulnerability that may affect millions of connected cameras globally, allowing attackers to hijack video streams. Nozomi Networks revealed the flaw in a popular software…
  • "A Backdoor In Mobile Phone Encryption From the 90s Still Exists"
    Researchers from Ruhr-Universität Bochum (RUB), in collaboration with colleagues from France and Norway, analyzed the encryption algorithm GEA-1, which was implemented in mobile phones in the 1990s for data connection encryption. They found that the GEA-…
  • "Elekta Data Breach Leaks Patient Info at Oklahoma Cancer Center"
    The Cancer Centers of Southwest Oklahoma recently announced that it was involved in a data breach that may have leaked sensitive patient information. The data security incident occurred on April 28 through Elekta, a Swedish software company and business…
  • "Peloton Bike+ Bug Gives Hackers Complete Control"
    Researchers from McAfee's Advanced Threat Research (ATR) team discovered that the popular Peloton Bike+ and Peloton Tread exercise equipment contain a security vulnerability that could expose gym users to a wide variety of cyberattacks. According to the…
  • "A Big Step Towards Cybersecurity's Holy Grail"
    A significant advancement towards a user-friendly computing environment, in which the guarantee of security is as strong as a mathematical proof, has been made by a team of researchers at Carnegie Mellon University's CyLab. They revealed a new provably…
  • "Researchers Explore Continuous Liveness Detection for Voice Biometrics"
    A new study by scientists from Florida State University and Rutgers University delved into the possibility of continuous liveness detection for voice biometrics implemented on smart devices. They released a paper with the goal of strengthening security…
  • "NATO Warns it Will Consider a Military Response to Cyber-Attacks"
    NATO has warned it is prepared to treat cyberattacks in the same way as an armed attack against any of its allies and issue a military response against the perpetrators. In a communique issued by governments attending the meeting of the North Atlantic…
  • "Defending Against Smudge Attacks"
    Many people use a Personal Identification Number (PIN) to lock their smartphone in order to prevent a third party from accessing their contacts, messages, and other stored information in the event that the device gets lost or stolen. However, a malicious…
  • "Utilities ‘Concerningly’ at Risk from Active Exploits"
    Utilities’ vulnerability to application exploits goes from bad to worse in just weeks. The amount of time that utility networks spend exposed to a known application exploit has spiked over the past two months. A new report from WhiteHat Security measured…