News
-
"Metaverse Poses Serious Privacy Risks for Users, Report Warns"According to a new report from New York University (NYU), the immersive Internet experience known as the metaverse will erode users' privacy unless significant measures are taken to improve and regulate how the technology collects and stores personal…
-
"KEV Catalog Reaches 1,000, What Does That Mean and What Have We Learned"The US Cybersecurity and Infrastructure Security Agency (CISA) launched the Known Exploited Vulnerabilities (KEV) catalog in November 2021 to provide an authoritative source of vulnerabilities that have been exploited "in the wild." Recently, the catalog…
-
"APT36 State Hackers Infect Android Devices Using YouTube App Clones"The APT36 hacking group, also known as Transparent Tribe, has been using at least three YouTube-mimicking Android apps to infect devices with their signature Remote Access Trojan (RAT) called CapraRAT. Once the malware has been installed on a victim's…
-
"CISA Sponsors Hack the Building 2.0 Hospital Competition"The US Cybersecurity and Infrastructure Security Agency (CISA) and the National Centers of Academic Excellence in Cybersecurity (NCAE-C) have sponsored the Hack the Building 2.0: Hospital Edition competition at the Maryland Innovation and Security…
-
"Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities"Earth Lusca, a threat actor with ties to China, has been observed targeting government organizations with a new Linux backdoor called SprySOCKS. Trend Micro first documented Earth Lusca in January 2022, detailing the adversary's attacks against public…
-
"Companies Still Don't Know How to Handle Generative AI Risks"According to the Information Services Group (ISG), companies are actively pursuing practical applications of generative Artificial Intelligence (AI) technology while staying mindful of its risks. Eighty-five percent of companies surveyed by ISG believe…
-
"'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks"Two Middle Eastern telecommunications organizations were recently compromised by a potentially novel threat actor using two backdoors with new methods for covertly loading malicious shellcode onto a target system. Cisco Talos dubbed the intrusion set "…
-
"Threat Actor Claims Major TransUnion Data Breach"A notorious threat actor linked to previous big-name breaches has recently released several gigabytes of personal data stolen from credit agency TransUnion. According to security researchers at Vx-underground, an individual who goes by the moniker…
-
"Clorox Struggling to Recover From August Cyberattack"Clorox has recently admitted its operations are still experiencing significant disruption after the firm experienced a cyberattack a month ago. Clorox announced the attack on August 14, revealing it had observed unauthorized activity on some IT…
-
"Microsoft AI Researchers Leak 38TB of Private Data"Microsoft has recently accidentally revealed a huge trove of sensitive internal information dating back over three years via a public GitHub repository. Security researchers at Wiz discovered the privacy snafu when they found the GitHub repository…
-
"Unhooking Phishing Threats - The Detection of Phishing Attempts in Communications Systems"There is a new approach to combating phishing attacks to improve online security, reduce cybercrime against individuals and businesses, and prevent attacks against governments. Computer security systems are continuously challenged by the emergence of…
-
"A New and Inclusive Approach to Privacy Technology Is Needed to Keep Users Safe Online"The UK's Online Safety Bill (OSB) will introduce several new digital regulations and offenses, but uncertainties persist regarding the future of online safety. The government and the technology industry are debating over how to create privacy-by-design (…