News
-
"FCC Approves Cyber Labeling Program for IoT Devices"The Federal Communications Commission (FCC) voted to establish a voluntary cybersecurity labeling program for Internet of Things (IoT) devices and other consumer-facing products that require an Internet connection.
-
"Discontinued Security Plugins Expose Many WordPress Sites to Takeover"Security researchers at Defiant are warning that thousands of WordPress websites are potentially at risk of takeover due to a critical severity vulnerability in two MiniOrange plugins that were discontinued recently.
-
NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)
-
"StopCrypt: Most Widely Distributed Ransomware Evolves to Evade Detection"StopCrypt ransomware, also known as STOP Djvu, has evolved with a new multi-stage execution process that better evades detection by security tools.
-
"RedLine Malware Top Credential Stealer of Last 6 Months"According to new research published by Specops, RedLine malware was used to steal over 170 million passwords in the last six months, making it the most notorious credential stealer during that period.
-
"Boat Dealer MarineMax Hit by Cyberattack"MarineMax, one of the world’s largest retailers of recreational boats and yachts, recently disclosed a cyberattack that has caused some disruption.
-
"Hackers Hiding Keylogger, RAT Malware in SVG Image Files"Threat actors are using Scalable Vector Graphic (SVG) image files to hide malware and avoid detection.
-
"BlackBerry: Global Financial Sector Faces 'Death by a Million Cuts' Through Malware Attacks"A new BlackBerry report reveals a significant increase in attacks on the global financial sector, with 1 million attacks recorded in just 120 days.
-
"SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub"SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC) have announced the launch of the 911 Cybersecurity Resource Hub where Emergency Communications Centers (ECCs) can report cyber incidents, find real-world case studies,
-
"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"Subscriber Identity Module (SIM) swappers have changed their attacks to steal a target's phone number by porting it to a new Embedded SIM (eSIM) card, which is a digital SIM in a rewritable chip found in many modern smartphones.
-
"ChatGPT Spills Secrets in Novel PoC Attack"Researchers from Google DeepMind, Open AI, ETH Zurich, McGill University, and the University of Washington have developed a new attack that extracts key architectural information from proprietary Large Language Models (LLMs) such as ChatGPT and Google
-
"Only 13% of Medical Devices Support Endpoint Protection Agents"According to Claroty, healthcare networks have been found to contain 63 percent of the Known Exploited Vulnerabilities (KEVs) tracked by the US Cybersecurity and Infrastructure Security Agency (CISA).