News
-
"Scams Now Make Up 75% of Cyber Threats"According to security researchers at Norton, scams involving human manipulation comprised 75% of all desktop threats in the first half of 2023.
-
"Bot Attack Costs Double to $86m Annually"According to security researchers at Netacea, the typical business in the US and UK loses over 4% of their online revenue every year due to malicious bot attacks.
-
"T-Mobile App Glitch Let Users See Other People's Account Info"T-Mobile customers reported being able to see the account and billing information of others after logging into the company's official mobile app.
-
"Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers"A financially motivated threat actor has been identified as an Initial Access Broker (IAB) who sells access to compromised organizations to other adversaries to perform follow-on attacks.
-
"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"As growing and maturing data services demand faster Internet speeds and operating systems call for better security, hackers and adversaries continue to interfere. For some, this involves infiltrating home and office wireless networks to steal personal or…
-
"The Life-or-Death Importance of Medical Device Security"Cybersecurity researcher Alex Vakulov emphasizes that cybersecurity is not always a top priority when developing smart medical devices. Many are easily connected to the Internet, are often found to have simple passwords, and occasionally do not require…
-
"P2Pinfect Botnet Targets Redis and SSH Services"P2Pinfect, a novel peer-to-peer botnet that targets the Redis and SSH open-source services, has experienced a 600-time increase in activity since August 28, including a 12.3 percent increase in traffic over the past week. According to Cado Security Labs…
-
"Research Warns Email Rules Are Being Weaponized by Cyberattackers"The cloud cybersecurity company Barracuda Networks has released new research on attackers using malicious email rules to steal information and avoid detection after compromising corporate networks. Automated email inbox rules help manage the flood of…
-
"What's Wrong With This Picture? NIST Face Analysis Program Helps to Find Answers"Face recognition software is often implemented to gatekeep access to secure websites and electronic devices. Researchers are looking into the possibility of defeating it simply by wearing a mask resembling another person's face. The National Institute of…
-
"Signal Upgrades Encryption to Ward off Quantum Attacks"Signal, the telecommunications app, has announced an upgrade to its cryptographic specifications aimed at withstanding a potential future cyberattack involving quantum computers. On September 19, Signal announced an upgrade to the X3DH specification…
-
"Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems"According to security researchers at SEC Consult, two vulnerabilities discovered earlier this year in Atos Unify products could allow malicious actors to cause disruption and even backdoor the targeted system. The vulnerabilities affect the Atos…
-
"Canada Blames Border Checkpoint Outages on Cyberattack"Several Canadian airports reportedly experienced service disruptions due to a cyberattack allegedly perpetrated by a pro-Russia hacking group. According to the Canada Border Services Agency (CBSA), recent connectivity issues that impacted airport check-…