News
  • "6,600 Organizations Bombarded With 100,000+ BEC Attacks"
    Researchers at Barracuda Networks have discovered that cybercriminals are increasingly registering accounts with legitimate services, such as Gmail and AOL, to use them in impersonation and BEC attacks.  Barracuda researchers observed that 6,170…
  • "Security Bugs Let These Car Hackers Remotely Control a Mercedes-Benz"
    The car security research team from Qihoo 360, called the Sky-Go Team, discovered over a dozen vulnerabilities in a Mercedes-Benz E-Class car by reverse-engineering the car's components using a  testbench they built. According to the researchers,…
  • "Beyond KrØØk: Even More Wi‑Fi Chips Vulnerable to Eavesdropping"
    Researchers have discovered a new vulnerability they are calling KrØØk (formally CVE-2019-15126).  KrØØk is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. Specifically, the bug…
  • "How Hackers Could Spy on Satellite Internet Traffic With Just $300 of Home TV Equipment"
    A researcher at Oxford University demonstrated the potential exploitation of vulnerabilities in satellite broadband communications to intercept unencrypted web traffic through the use of an inexpensive satellite dish and a digital broadcasting satellite…
  • "Malware Attacks Exploiting Machine Identities Double"
    New research by threat analysts at Venafi reveals that the number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019. Applications and devices use machine identities that are made from cryptographic keys and…
  • "Consumers Don't Fully Trust Smart Home Technologies"
    Although smart home technologies are marketed to increase the convenience of our daily lives, many consumers still do not trust the privacy and security of these technologies. Researchers from WMG and Computer Science, University of Warwick, conducted a…
  • "Researchers Found Another Way to Hack Android Cellphones via Bluetooth"
    Security researchers at DBAPPSecurity have discovered an authentication bypass vulnerability, dubbed “BlueRepli.”  An adversary can bypass authentication by imitating a device that has previously been connected with a target. Victims do not need to…
  • "TeamViewer Flaw Could be Exploited to Crack Users’ Password"
    Security researchers have discovered a high-risk vulnerability (CVE-2020-13699) in TeamViewer for Windows. If the vulnerability is exploited, remote attackers could crack the users’ password, which could lead to further system exploitation.  CVE-…
  • "New EtherOops Attack Takes Advantage of Faulty Ethernet Cables"
    A team of researchers from the Internet of Things (IoT) security company Armis discovered a technique, dubbed EtherOops, that could be used to attack devices placed inside closed enterprise networks. According to the researchers, the method can only be…
  • "Misconfigured Servers Contributed to More Than 200 Cloud Breaches"
    A new report from Accurics, titled "The State of DevSecOps," reveals that the misconfiguration of storage services in over 90 percent of cloud deployments have led to more than 200 breaches in the past two years. These breaches have exposed more than 30…
  • "Your Mobile Location Data Could Pose Security Threats: NSA"
    The U.S. National Security Agency (NSA) released a report on how location data tracked via mobile phones and other connected devices such as fitness trackers, smartwatches, and built-in vehicle communication devices could threaten security. While the…
  • "Researchers Uncover Vulnerabilities in Devices Used at Industrial Facilities"
    After 2015 when Russian hackers were able to hack three Ukrainian power companies, some security experts took it on themselves to show how protocol gateways could be exploited at other utilities.  New research has been conducted by researchers at…