News
-
"Organizations Invest in AI Tools to Elevate Email Security"According to IRONSCALES and Osterman Research, specialized email security vendors are leveraging a combination of Artificial Intelligence (AI) and human insights to improve email security and combat emergent threat methods enhanced by AI. The threat…
-
"Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs"Australian financial services company Latitude Financial recently reported that the cyberattack disclosed earlier this year has cost it tens of millions of dollars. In a financial report covering the first half of 2023, the consumer lender reported…
-
"Tesla Discloses Data Breach Related to Whistleblower Leak"Tesla has recently disclosed a data breach impacting roughly 75,000 people, but the incident is the result of a whistleblower leak rather than a malicious cyberattack. Tesla recently told US authorities that a data breach discovered in May resulted…
-
"Cuba Ransomware Group Steals Credentials Via Veeam Exploit"According to security researchers at BlackBerry, a notorious Russian-speaking ransomware group has updated its attack tooling to include a Veeam exploit designed to harvest logins. The researchers stated that their discovery came from…
-
"Research Hack Reveals Call Security Risk in Smartphones"Advanced smartphone features entice users who want more from their devices, especially in regard to health and entertainment, but the question is whether these features pose a security risk when making or receiving actual calls. A team of researchers…
-
"Android Browsers Threaten User Privacy, Says Khoury-Led International Research Team"In a recent study titled "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers," Amogh Pradeep, a doctoral student at Khoury College, and his multinational research team set out to examine the personal data collected by browsers and…
-
"MRU Researchers Share Insights on How to Combat Hybrid-Cyber-Attacks"Due to their complexity, hybrid cyber threats are dangerous. Oftentimes, cyberattacks are accompanied by an information component designed to achieve specific objectives, such as misleading the public or convincing them of things favorable to the nation…
-
"Bug Hunter’s Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem"A team led by the University of Maryland received a distinguished paper award for examining the challenges encountered by bug bounty hunters or ethical hackers who discover and report vulnerabilities or bugs to a platform's developer. The paper, titled "…
-
"Hackers Figured Out 3 separate Ways to Break Into US Air Force Satellites, And Won up to $50K For Doing it"Hackers recently managed to break into a US Air Force satellite in orbit and took home prizes of up to $50,000 for exposing the vulnerabilities. Italian team "mHACKeroni" were the winners of the US Space Force annual "Hack-A-Sat" competition, which…
-
"Cisco Patches High-Severity Vulnerabilities in Enterprise Applications"Cisco recently announced security updates for several enterprise applications to patch high-severity vulnerabilities leading to privilege escalation, SQL injection, directory traversal, and denial-of-service (DoS). The most severe of these impacts…
-
"Zimbra Users in Europe, Latin America Face Phishing Threat"Researchers at ESET have discovered a widespread phishing campaign designed to steal the credentials of Zimbra account holders. The collaborative software platform Zimbra Collaboration is a popular alternative to enterprise email solutions. At least…
-
"Thousands of Android APKs Use Compression Trick to Thwart Analysis"Threat actors are increasingly distributing malicious Android APKs (packaged app installers) that can resist decompilation through unsupported, unknown, or highly adjusted compression algorithms. The main benefit of this strategy is evading detection by…