News
-
"World's Largest Association of Computing Professionals Issues Principles for Generative AI Technologies"The Association for Computing Machinery's global Technology Policy Council (ACM TPC) has issued "Principles for the Development, Deployment, and Use of Generative AI Technologies" in response to significant advancements in generative Artificial…
-
"Only Two Percent of Organizations Feel Confident in Their Cybersecurity Strategies"According to a new report from the critical infrastructure protection specialist OPSWAT, although 75 percent of organizations have made significant efforts to upgrade their infrastructure in the past year and 78 percent have increased their security…
-
"Hackers Target Chinese-Speaking Microsoft Users With 'RedDriver' Browser Hijacker"According to cybersecurity researchers, hackers are targeting Chinese-speaking Microsoft users with a tool called RedDriver that enables them to intercept web browser traffic. The Cisco Talos team has identified multiple variants of the RedDriver tool,…
-
"Scam Page Volumes Surge 304% Annually"Security researchers at Group-IB have recorded a 62% year-on-year (YoY) increase in phishing websites and a 304% surge in scam pages in 2022. The researchers found that the average number of instances in which a brand’s image and logo was…
-
"Cryptocurrency Crime Is Down in 2023, but Ransomware Is Up"A snapshot of cryptocurrency-related crimes at the midpoint of 2023 revealed a drop in the amount of money directed to wallets associated with known or suspected criminal activity in nearly every category of crime. A report by Chainalysis revealed that…
-
"Apple's Rapid Zero-Day Patch Causes Safari Issues, Users Say"Less than 24 hours after releasing an emergency patch for a zero-day security flaw being actively exploited in the wild, Apple's patch rollout is reported to have broken certain websites in Safari. Apple's WebKit browser engine contains the flaw, tracked…
-
"Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector"Researchers have discovered a Microsoft-signed rootkit designed to communicate with an actor-controlled attack infrastructure. Trend Micro attributes the activity cluster to the same actor previously identified as being responsible for the FiveSys…
-
"Hackers Exploit Windows Policy to Load Malicious Kernel Drivers"Microsoft blocked code signing certificates mainly used by Chinese hackers and developers to sign and load malicious kernel-mode drivers on compromised systems through the exploitation of a Windows policy loophole. Kernel-mode drivers work at the highest…
-
"Same Code, Different Ransomware? Leaks Kick-Start Myriad of New Variants"According to the H1 2023 ESET Threat Report, trends in the threat landscape demonstrate the adaptability of cybercriminals as they seek out new methods of attack, such as exploiting vulnerabilities, gaining unauthorized access, compromising sensitive…
-
"Leading the Way to Cyber Safety on Roads and Highways"A new research center led by the University of Houston aims to help prevent potential cyberattacks that could hinder the safe and efficient movement of people and products throughout the US and the world. The Transportation Cybersecurity Center for…
-
"Quantum Physics Secures Digital Payments"Using a combination of modern cryptographic techniques and the fundamental properties of quantum light, scientists from the University of Vienna have designed an unconditionally secure system for shopping in digital settings. The research team…
-
"Online Safety Bill Undermines Privacy Online, Say UK's Top Cyber Security Experts"Scientists from the UK's National Research Centre on Privacy, Harm Reduction, and Adversarial Influence Online (REPHRAIN) urge government and parliament to consider independent scientific evaluation before passing the Online Safety Bill that could…