-
"Fooling Deepfake Detectors"Deepfakes refer to synthetic media, including images and videos, created using Artificial Intelligence (AI). Deepfakes remain a significant issue despite recent developments in security measures that can detect many of them. Bart Kosko, a professor in…
-
"Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple's Bug Bounty Program"As part of Apple's bug bounty program, a team of researchers analyzed the company's online services and found a total of 55 vulnerabilities, 11 of which were flagged as critical. The team received a reward of $288,500 for their findings. According to the…
-
"Compliance Activities Cost Organizations $3.5 Million Annually"Researchers at Telos have discovered that organizations are struggling to keep up with IT security and privacy compliance regulations. Researchers at Telos surveyed 300 IT security professionals in July and August. The survey revealed that,…
-
"Fitbit Spyware Steals Personal Data via Watch Face"Using the Fitbit application API, Kev Breen, the director of cyber research for Immersive Labs, built a malicious Fitbit application. This app contains spyware that can steal user information such as gender, age, heart rate, and weight, as well as…
-
"Protecting Device Software from Zero-Day Attacks with TrustMS"The Department of Homeland Security (DHS) Science and Technology Directorate (S&T), in partnership with Intelligent Automation, Inc. (IAI), developed a new technology called the Trusted Mobile System (TrustMS). This cybersecurity tool secures device…
-
"Facebook Debuts Bug-Bounty ‘Loyalty Program’"Facebook is creating a loyalty program as part of its bug-bounty offering, hoping to incentivize researchers to find vulnerabilities in its platform. Facebook bounty hunters will be placed into tiers by analyzing their score, signal, and the number…
-
"Election Systems Under Attack via Microsoft Zerologon Exploits"The Cybersecurity Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that advanced persistent threat actors (APTs) are now leveraging Microsoft’s severe privilege-escalation flaw, dubbed “Zerologon,” to target…
-
"25% of BEC Cybercriminals Based in the US"The Agari Cyber Intelligence Division (ACID) published the results of a study on the operations of Business Email Compromise (BEC) attacks. These results give insight into the global footprint of BEC activity. Researchers looked at information on 9,000…
-
"Watchdog Urges More Action to Protect Planes from Hackers"The Government Accountability Office (GAO) calls on federal regulators to increase efforts toward strengthening the security of airliners' computer systems against hackers. The agency pointed out that the Federal Aviation Administration (FAA) has not…
-
"Hackers Chain Windows, VPN Bugs to Access Government Systems"Vulnerability chaining is a tactic in which multiple bugs are used to compromise a network or application. According to a joint statement released by CISA and the FBI, hackers have recently applied this tactic by exploiting a combination of Windows and…
-
"How Lack of Visibility Over IaaS Cloud Infrastructure Fuels Cyberattacks"The COVID-19 crisis has sped up the adoption of cloud technologies, further emphasizing the importance of strengthening cloud security. Although more businesses are adopting cloud technologies to protect their data and networks, their processes are weak…
-
"Microsoft And Partners Cut Off Key Trickbot Botnet Infrastructure"A coalition of tech companies headed by Microsoft has struck a serious blow against the adversaries behind the Trickbot botnet. The researchers disrupted Trickbot through a court order they obtained and the technical action they executed in…
News