-
"Google Announces Inaugural Cohort in Cybersecurity Initiative"Researchers at Cornell Tech and the Cornell Ann S. Bowers College of Computing and Information Science are part of the first cohort of participants from four institutions to receive funding from the Google Cyber New York City (NYC) Institutional Research…
-
"Researchers Uncover Fake Base Stations in Cellular Networks Using Machine Learning"Cellular networks are essential for various applications, including phone calls and Internet access. However, the growth of fake base stations in cellular networks, sometimes known as stingrays, cell-site simulators, or IMSI catchers, poses a major…
-
"A Defense Against Attacks on Unmanned Ground and Aerial Vehicles"A University of Texas at Arlington (UTA) engineering researcher is developing defenses to prevent cyberattacks targeting networks of self-driving cars and Unmanned Aerial Vehicles (UAVs). Animesh Chakravarthy, associate professor in the Department of…
-
"Hacktivism: Is It Fashionable Again or Just a Sly Cover?"Reports of "hacktivism" are rising, with 2022 seeing a significant resurgence in the area, primarily fueled by the Russia-Ukraine conflict. According to Radware data, from February 18 to April 18 this year, hacktivists claimed over 1,800 Distributed…
-
"Decoy Dog Malware Upgraded to Include New Features"Security researchers at Infoblox have released crucial updates on the “Decoy Dog” remote access trojan (RAT) toolkit in a new threat report published today. Decoy Dog was initially discovered and disclosed in April 2023. Decoy Dog has proven…
-
"Sneaky Python Package Security Fixes Help No One – Except Miscreants"According to computer security researchers, Python security fixes are often implemented through "silent" code commits without an associated Common Vulnerabilities and Exposures (CVE) identifier. That is not ideal, they argue, because attackers like…
-
"No, Criminals Are Not in Love With VPNs, Expert Insists"CrowdSec analyzed data on malicious Internet Protocol (IP) addresses and discovered that most malicious activity stems from Russia, the US, and India. Over one million IP addresses in each of these countries have been reported as malicious. However,…
-
"CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"According to a new report from the US Cybersecurity and Infrastructure Security Agency (CISA), more than half of all cyberattacks against government agencies, critical infrastructure organizations, and state-level government bodies involved legitimate…
-
"Over 900,000 MikroTik Routers Exposed to Critical Bug"Security researchers at VulnCheck have warned that hundreds of thousands of routers produced by Latvian networking equipment maker MikroTik are vulnerable to a critical bug that could enable attackers to remotely control affected devices. The…
-
"Education Sector Has Highest Ransomware Victim Count"According to security researchers at Sophos, the education sector recorded a higher share of ransomware victims than any other in 2022. During the study, the researchers conducted interviews with 400 IT and cybersecurity leaders globally, split…
-
"Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets"Realst is a new malware family targeting Apple macOS systems. A third of the samples are already designed to infect macOS 14 Sonoma, the upcoming major release of the operating system. The malware is written in the Rust programming language and is…
-
"ALPHV Ransomware Adds Data Leak API in New Extortion Strategy"The ALPHV ransomware group, also known as BlackCat, is attempting to increase the pressure on their victims to pay a ransom by providing an Application Programming Interface (API) for their leak site in order to increase the visibility of their attacks.…
News