News
-
"Fake Malware Targets Cybercriminal Wannabes"HP Wolf Security has found fake malware designed to lure would-be cybercriminals into compromising their own devices.
-
"Iranian Hackers Caught Spying on Governments and Military in Middle East"An Iranian nation-state threat actor, tracked as Scarred Manticore, primarily targets government, military, and telecommunications sectors in Saudi Arabia, the United Arab Emirates, Jordan, Kuwait, Oman, Iraq, and Israel.
-
"KillNet Group Touts New Feature-Rich 'DDoS-For-Hire' Service"The threat group KillNet is selling a new Distributed Denial-of-Service (DDoS) tool that could encourage more cybercriminals to conduct DDoS attacks.
-
"Hackers Exploit Recent F5 BIG-IP Flaws in Stealthy Attacks"F5 has issued a warning to BIG-IP administrators about "skilled" hackers compromising devices by exploiting two recently disclosed vulnerabilities to hide their access and stealthily execute code.
-
"North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware"State-sponsored threat actors from the Democratic People's Republic of Korea (DPRK) have been targeting blockchain engineers of an unnamed cryptocurrency exchange platform through Discord with macOS malware named KANDYKORN.
-
"BiBi-Linux Wiper Targets Israeli Companies"Attackers are using new wiper malware called BiBi-Linux in attacks against Israeli companies to destroy their data.
-
"'Prolific Puma' Hacker Gives Cybercriminals Access to .us Domains"A link-shortening service provides cyberattackers and scammers with .us top-level domains, making their phishing campaigns slightly less detectable.
-
"Accelerating AI Tasks While Preserving Data Security"Researchers at the Massachusetts Institute of Technology (MIT) have developed a search engine called SecureLoop, capable of efficiently identifying optimal designs for deep neural network accelerators that preserve data security while improving perform
-
"Online Games Use Dark Designs To Collect Player Data"According to a new study from Aalto University, online games' privacy policies and practices have dark design patterns that may be deceptive, misleading, or coercive to users.
-
"Abertay cyberQuarter Hosts Launch of World-First Cybersecurity Book"A world-first illustrated children's book aimed at teaching children ages 4 to 7 about cybersecurity and how to protect their information online was released at Abertay cyberQuarter by Education Scotland in collaboration with the Scottish Governm
-
"US Water Sector Vulnerable to Cyber Threats, Professor Says"Jongeun You, an assistant professor of political science at Northern Michigan University, brings further attention to the vulnerability of the US water sector to cyberattacks.
-
"Khoury 'Women Who Empower' Winners Advance Cybersecurity, Pet Care Tools"Alexis Musaelyan-Blackmon won first place in the "Powering Diverse and Inclusive Communities of Belonging" category of the third annual Women Who Empower Innovator Awards presented by Northeastern University.