News
  • "How Lack of Visibility Over IaaS Cloud Infrastructure Fuels Cyberattacks"
    The COVID-19 crisis has sped up the adoption of cloud technologies, further emphasizing the importance of strengthening cloud security. Although more businesses are adopting cloud technologies to protect their data and networks, their processes are weak…
  • "Microsoft And Partners Cut Off Key Trickbot Botnet Infrastructure"
    A coalition of tech companies headed by Microsoft has struck a serious blow against the adversaries behind the Trickbot botnet.  The researchers disrupted Trickbot through a court order they obtained and the technical action they executed in…
  • "Zero Trust Becoming Cyber Strategy of Choice Across Defense Department"
    Several agencies with the U.S. Department of Defense (DoD) are building a  zero-trust architecture. This architecture secures IT systems by treating all users as potential threats. All users must be authenticated, and their access must be authorized…
  • "Microsoft Warns of 'Continuously Evolving' Android Ransomware"
    Microsoft has identified a new strain of Android ransomware known as AndroidOS/MalLocker.B. According to Microsoft researchers, the authors of this malware have been continuously been updating it. The new variant applies various methods to circumvent the…
  • "C&C Panels of 10 IoT Botnets Compromised by Researchers"
    Two security researchers from SecNiche Security Labs were able to access the command and control (C&C) panels of Internet of Things (IoT) botnets, including Mana, Vivid, 911-Net, Purge Net, Goon, Kawaii, 0xSec. The compromise of IoT botnets' C&C…
  • "ATM Cash-Out: A Rising Threat Requiring Urgent Attention"
    The PCI Security Standards Council (PCI SSC) and the ATM Industry Association (ATMIA) have started to warn financial institutions of ATM cash-out attacks.   Adversaries usually insert malware via phishing or social engineering methods into a…
  • "Finding the Origins of a Hacker"
    Sarah Freeman is senior industrial control systems cybersecurity analyst at Idaho National Laboratory (INL) who looks at the different aspects of cyberthreats facing critical infrastructure. Attacks against pipelines, transportation networks, and other…
  • "US Seizes Domains Used to Spread Disinformation"
    The US seized 92 domains allegedly used by Iran's Islamic Revolutionary Gaurd Corps (IRGC) to spread disinformation. Four of the websites seized by the US appeared to be genuine online news outlets. However, the US alleges that these sites were IRGC's…
  • "Are Brain-Computer Interface Spellers Secure?"
    A Brain-Computer Interface (BCI) allows people to use their brain activity to interact with a computer. A team of researchers led by Professor Dongrui Wu from the Huazhong University of Science and Technology (HUST) explored the security of…
  • "Only 27.9% of Organizations Able to Maintain Compliance With The PCI DSS"
    Global organizations are still putting their customers’ cardholder data at risk due to a lack of long term payment security strategy and execution, flags the Verizon report.  Payment data remains one of the most sought after and lucrative targets by…
  • "Emotet Is Back and Phishing State and Local Governments, CISA Warns"
    The Cybersecurity and Infrastructure Security Agency (CISA) published an alert about the recent resurgence of the credential-stealing malware Emotet. Since its return, there has an increase in Emotet attacks against U.S. state and local governments.…
  • "QNAP Fixes Critical Flaws That Could Lead to Device Takeover"
    QNAP has fixed two critical vulnerabilities that could allow attackers to take over its network-attached storage (NAS) devices. The vulnerabilities were contained by Helpdesk, an app built into QNAP's NAS devices that admins could use to send requests…