-
"Securing The Internet"Assistant Professor of Information Systems at Singapore Management University (SMU), Wang Qiuhong, explored the connections and interdependencies among Autonomous Systems (ASes), which are Internet Service Providers' (ISP) networks. One of this study's…
-
"Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams"According to a new study by Palo Alto Networks, cybercriminals are frequently impersonating global brands through the performance of cyber-squatting to execute phishing attacks and scams aimed at stealing credentials or money. Cyber-squatting refers to…
-
"Slack Patches Critical Desktop Vulnerability"A security engineer at Evolution Gaming discovered a critical remote-code execution (RCE) vulnerability in the popular Slack collaboration app, which has now been patched. The vulnerability could have allowed attackers to gain full remote control over…
-
"NCR Confirms Malware in Lab Environment, Says Clients Not at Risk"NCR Corporation, the popular point-of-sale and ATM software developer, has confirmed that computers in an isolated non-production lab have been infected with malware, potentially posing a supply-chain risk to customers. The malware was identified as…
-
"Apple's Automated Notarization Process Mistakenly Approved Mac Malware"Security researchers Patrick Wardle and Peter Dantini discovered that Apple's macOS app notarization process inadvertently approved Mac malware disguised as a Flash player. The notarization would result in the circumvention of Apple's built-in Gatekeeper…
-
"Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked"Researchers at CyberNews hacked 28,000 printers to highlight how easy it is to compromise them and the importance of improving security for such devices. They found that more than 800,000 printers could be accessed over the internet. Out of a sample…
-
"Research Finds Increase in Botnet and Exploit Activity in Q2 2020"Nuspire released a new report on cybercriminal activities, tactics, techniques, and procedures observed in the second quarter of 2020. According to the report, new challenges for security administrators are continuing to emerge as organizations settle…
-
"Credential Theft Via Spoofed Login Pages Increase, Healthcare Top Target"According to a new report from IRONSACLES, there has been a significant increase in successful credential theft attempts via spoofed login pages and social engineering attacks in the first half of the year, most of which targeted those working in the…
-
"Browsing Histories Can Be Used to Track Users"A study conducted by Mozilla researchers has confirmed that browsing histories can be employed to track users by compiling unique browsing profiles. They collected browsing data from 52,000 Firefox users for two weeks. The examination of the…
-
"Red Cross Chief: Cyber Attacks Increasing on Hospitals"Peter Maurer, the president of the International Committee of the Red Cross (ICRC), has brought further attention to the increased execution of sophisticated cyberattacks against hospitals, electricity and water supplies, and other critical civilian…
-
"Your Email Threads Are Now Being Hijacked by The QBot Trojan"QBot Trojan operators are using new tactics to hijack legitimate, emailed conversations to steal credentials and financial data. Researchers at Check Point warn that Microsoft Outlook users are susceptible to a module designed to collect and…
-
"Cybersecurity Community Concerned About Misinformation"Concerns surrounding misinformation continue to grow among cybersecurity professionals as the amount of online misinformation and fake domains rise. A new report by the Neustar International Security Council (NISC) reveals that nearly half of…
News