News
-
"Apache Struts 2 – Under Attack Now"Apache Struts 2 has been discovered to have a vulnerability within its open source code. Cyberattacks are currently exploiting this vulnerability as Apache Struts 2 is widely utilized to develop Java web applications in the financial services…
-
"SGX Malware Extracts RSA Key in Five Minutes"Software Guard Extensions use isolation methods to safeguard code and data from content modification and exposure. Intel is now utilizing this method for Skylake models in order to further protect data in the cloud. However, researchers at Graz…
-
"WikiLeaks Dumps CIA Hacking Docs Online"WikiLeaks strikes again as it exposes classified documents of the U.S. Central Intelligence Agency. Leaked documents reveal confidential information pertaining to hacking programs and weaponized malware such as trojans and viruses. This article discusses…
-
"The Darknet protects itself by being more robust against attacks"Researchers at URV reveal why it’s so difficult for cyberattacks to penetrate the Darknet. The Darknet is the hidden part of the internet that allows users to anonymously exchange sensitive information and perform illicit activities. Researchers reveal…
-
"Honeypot catches social engineering scams on social media"Research company, ZeroFOX, performed an investigation on impersonators on social media by creating honeypot accounts within a sandboxed environment and observing the different social engineering tactics performed. This article discusses the motives…
-
“Why Printers Still Pose a Security Threat”Researchers at University Alliance Ruhr have performed further investigations on printer security and have announced that printers within a network are still prone to several different types of attacks. Laser printers have been identified as the most…
-
“Foreign actors probe systems of oil, gas operations, say cybersecurity researchers”Security researchers reveal that foreign hacking groups have been recruited to examine U.S. and Europe critical infrastructure systems in management of oil, gas, and power. This article discusses cases in which these foreign actors allegedly attempted to…
-
“An IoT Teddy Bear Leaked Millions of Parent and Child Voice Recordings”Another toy has been hacked to steal account data of an estimated 800,000 users along with two million message recordings. CloudPets’ toys allow users to exchange audio voice messages. The toy company failed to implement security measures such as a…
-
"Backup Error Exposes 1.37 Billion-Record Spamming Database"Security researchers at anti-virus company, MacKeeper, have discovered backup databases that hold about 1.37 million records of names, IP addresses, zip codes, and other personal addresses. These databases were left exposed by marketing company, River…
-
"House Bill would give companies some leeway to hack back"A new House Bill would permit companies that are victims of hackers to retaliate through hacking back, under the condition that they do not destroy any of the hackers’ data. This condition is put in place to protect innocent bystanders that may be…
-
"Fileless PowerShell malware uses DNS as covert channel"Cyberattacks are becoming increasingly harder to detect as shown by the latest attack, DNSMessenger. Researchers from Cisco Systems’ Talos team have discovered the DNSMessenger, which is distributed through email phishing tactics and when opened,…
-
"Health Organizations Spending Big on Cybersecurity"As healthcare organizations improve upon medical services and digital medical record management through technological innovations, cybersecurity becomes a bigger concern. Healthcare organizations are expected to increase spending on information security…