News
  • "House Bill Would Ban States From Weakening Encryption"
    Four members of the U.S. House of Representatives recently reintroduced a bill known as the Ensuring National Constitutional Rights for Your Private Telecommunications (ENCRYPT) Act. This bill is designed to prevent states and municipalities from passing…
  • "Critical Vulnerabilities Identified in CODESYS ICS Automation Software"
    Researchers from Positive Technologies have identified ten vulnerabilities in CODESYS automation software for Industrial Control Systems (ICS), some of which have been rated high and critical in severity. According to Vladimir Nazarov, Head of ICS…
  • "PNNL's Shadow Figment Technology Foils Cyberattacks"
    Scientists at the U.S. Department of Energy's Pacific Northwest National Laboratory have developed a cybersecurity technology called Shadow Figment. This technology aims to protect buildings, the electric grid, pipelines, and other physical targets from…
  • "Why Combining FIDO2 and PKI Provides Broader Enterprise-Wide Security"
    The COVID-19 pandemic has changed how and where corporate resources are accessed, which heightens the need for organizations to update their identity and authentication systems. According to a 2021 Gartner CIO survey, more than 60 percent of employees at…
  • "NY Transit Officials Confirm Cyberattack; Say Harm Limited"
    Hackers recently compromised computer systems used for the Metropolitan Transportation Authority (MTA) in New York. The incident sparked a rush to prevent a cyberattack that could cripple North America's largest transit system. MTA officials released a…
  • "Insurance Firm CNA Financial Reportedly Paid Hackers $40 Million in Ransom"
    CNA, a US insurance giant, paid $40 million ransom to recover its systems in March. This was one of the largest payments so far. The attack was carried out using Phoenix CryptoLocker believed to have been used by Evil Corp a Russian cybercrime Network.…
  • "Plug-ins for Code Editors Pose Developer-Security Threat"
    Critical vulnerabilities were discovered in two plug-ins for Microsoft's popular Visual Studio Code editor. According to the software security firm Snyk, the exploitation of these vulnerabilities could allow an attacker to execute malware by tricking a…
  • "Google Reveals a New Rowhammer Attack"
    Google recently released details regarding its discovery of a new Rowhammer vulnerability. The vulnerability dubbed "Half-Double" improves upon the attack style used against DRAM memory, first reported in 2014, suggesting that the Rowhammer problem will…
  • "New Epsilon Red Ransomware Hunts Unpatched Microsoft Exchange Servers"
    A new form of ransomware called "Epsilon Red" has been discovered in the wild, exploiting Microsoft Exchange server vulnerabilities to encrypt machines across a network. This ransomware relies on over a dozen scripts before it reaches the encryption…
  • "Targeted AnyDesk Ads on Google Served Up Weaponized App"
    Hackers used fake ads on Google to trick users into downloading a malicious AnyDesk application. The ad campaign ranked higher in downloads than even the real AnyDesk ads. Researchers estimated that over 40% of users who clicked on the fake ad,…
  • "Securing Devices Is the Future of Blockchain Technology"
    Blockchain technology can be used to create trust among Internet of Things (IoT) devices, which is essential to the success of IoT networks. Improving trust among these devices can enable an autonomous security robot to check the security clearances…
  • "Interpol Seizes $83 Million Headed for Online Scammers"
    Global police have concluded a months-long campaign in which they seized $83 million in funds headed for the bank accounts of cyber-criminals and scammers. Interpol stated that 40 officers from across APAC participated in the HAECHI-I operation over a…