News
  • Cyber Scene #25 - CRAZY (CYBER) RICH...
    Cyber Scene #25 CRAZY (CYBER) RICH...
  • SoS Musings #18 - Get Smart About Smart City Cybersecurity
    SoS Musings #18 Get Smart About Smart City Cybersecurity
  • "Mirai Creators Helping FBI Crack Cybercrime Cases"
    Creators of the infamous Mirai botnet are now completing their community service by assisting the FBI in the investigation of cybercrimes and performance of other cybersecurity-related tasks. The skills that these offenders used in their performance of…
  • New Whitehouse National Cyber Strategy
    Whitehouse has released a National Cyber Strategy. The strategy is to "strength our defense against cyber threats." Highlights include: Defend the homeland by protecting networks, systems, functions, and data; Promote American prosperity by…
  • "Someone Watching? Tenable Says Hackers Can Access, Alter Surveillance Footage"
    A zero-day vulnerability called Peekaboo has been discovered in NUUO software used by thousands of web-based surveillance cameras. The exploitation of this vulnerability could allow hackers to remotely execute code in the NUUO software,…
  • "Secure Encrypted Virtualization: How Is This Technology Exploited?"
    A new attack targeting virtual machines has been discovered by security researchers. The attack dubbed SEVered targets virtual machines that use AMD’s Secure Encrypted Virtualization (SEV) for encrypted protection. This article continues to discuss the…
  • Pub Crawl #19
     
  • “Hackers Mined a Fortune from Indian Websites”
    Researchers discovered that various government websites from India were being used for the cryptojacking. As of September 16, according to the article, the websites involved were still running the infecting script, even after officials were notified.…
  • "Researchers Observe Threat Actor Using Varied Tools and Payloads to Distribute Monero Miners"
    Rocke is a new threat actor that has been observed by researchers at Cisco Talos be making use of a wide variety of tools and payloads in order to deliver Monero-based cryptomining malware. According to researchers, Rocke has been using an array of Git…
  • "Tesla Model S Key Fobs Were Vulnerable to a Low-Tech Hack"
    Researchers from KU Leuven university in Belgium have uncovered a security vulnerability contained the Tesla Model S. This vulnerability could allow adversaries to create a duplicate of the car's key fob in order to unlock the vehicle and drive off with…
  • "Modular Malware Brings Stealthy Attacks to Former Soviet States"
    Recent discoveries by researchers have brought further attention to the use of modular malware downloaders by attackers. Two new modular downloaders have been discovered by researchers at Proofpoint. This article continues to discuss the new modular…
  • "New Security Research Reveals Password Inadequacy Still a Top Threat"
    One of the findings shared in WatchGuard’s Internet Security Report for Q2 2018 suggests that weak password creation remains a top threat to security. The finding calls for an increase in the implementation of multi-factor authentication (MFA) solutions…