News
-
"Threat Intelligence's Key Role in Mitigating Malware Threats"According to OPSWAT, malware, one of the most prevalent and pervasive initial threat vectors, continues to evolve and become more sophisticated. Using malware as a foothold, threat actors infiltrate targeted infrastructures and then move laterally to…
-
"Dell Credentials Bug Opens VMWare Environments to Takeover"Credentials hardcoded in the Dell Compellent storage array service could allow attackers to take control of enterprise VMware environments in organizations using both services. According to Enlyft, Dell Compellent reached its end of life in 2019. However…
-
"University of Michigan Researchers Create Screen Protection System to Fend Off Shoulder Surfers"Eye-Shield is an innovative screen protection system developed by researchers at the University of Michigan that obscures images and text on a user's phone and other devices when seen from a distance. According to the researchers, previous methods have…
-
"Researchers Put LLMs to the Test in Phishing Email Experiment"A team of security researchers tested the performance of Large Language Models (LLMs) in composing convincing phishing emails and detecting them. The results showed that Artificial Intelligence (AI) technology could generate highly effective phishing…
-
"New York Introduces First-Ever Statewide Cybersecurity Strategy"Governor Kathy Hochul has recently introduced New York's first-ever statewide cybersecurity strategy, reinforced by a $600m commitment. The initiative is designed to shield critical infrastructure, data, networks, and technology systems from…
-
"The New Technology That Is Making Cars Easier for Criminals to Steal, or Crash"The automotive industry is abuzz with the "Internet of Vehicles" (IoV) discussion. This describes a network of cars and other vehicles that can exchange data over the Internet to make transportation more autonomous, safe, and efficient. The IoV could…
-
"Interpol Shuts Down African Cybercrime Group, Seizes $2 Million"A recent cross-border investigation into West African cybercriminal groups has resulted in 103 arrests and the seizure of more than $2.2 million. Operation Jackal was led by law enforcement agencies across 21 countries on six continents and…
-
"Researchers Watched 100 Hours of Hackers Hacking Honeypot Computers"Two security researchers deployed several Windows servers that were deliberately exposed to the Internet. They were set up with Remote Desktop Protocol (RDP), allowing hackers to remotely control the compromised servers as if they were regular users.…
-
"Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives"There has been an increase in the use of a Phishing-as-a-Service (PhaaS) toolkit called EvilProxy by threat actors to conduct account takeover attacks targeting high-ranking executives at well-known companies. According to Proofpoint, an ongoing hybrid…
-
"Hackers Use Open-Source Merlin Post-Exploitation Toolkit in Attacks"Ukraine warns of a wave of attacks using Merlin, an open-source post-exploitation and command-and-control (C2) framework, against state organizations. Merlin is a Go-based, cross-platform post-exploitation toolkit that is freely available via GitHub and…
-
"White House Launches AI Cyber Challenge to Make Software More Secure"The Biden-Harris Administration has launched a two-year competition to protect the most critical software in the US using Artificial Intelligence (AI). The AI Cyber Challenge (AIxCC) calls on competitors across the US to identify and fix software…
-
"'MoustachedBouncer' APT Spies on Embassies, Likely via ISPs"An Advanced Persistent Threat (APT) group with ties to Belarus spied on staff in at least four embassies operating in the country, most likely by abusing the country's local Internet Service Provider (ISP). According to malware researcher Matthieu Faou…