News
-
"NSA and CISA Release Guide To Protect Baseboard Management Controllers"Baseboard Management Controllers (BMCs) are common server-class computer components. Cybercriminals could exploit the capabilities of these controllers to compromise industry and government systems. Neal Ziring, the Technical Director of the National…
-
"New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT"Generative Artificial Intelligence (AI) tools such as ChatGPT pose significant threats to organizations' sensitive data. New research from the browser security company LayerX highlighted the scope and nature of these risks. The "Revealing the True GenAI…
-
"Barracuda Zero-Day Exploited by Chinese Actor"A zero-day vulnerability in the Barracuda Email Security Gateway (ESG) discovered in late May has been exploited in a Chinese espionage campaign since October 2022, according to security researchers at Mandiant. The researchers noted that new…
-
"Russian Hackers Use PowerShell USB Malware to Drop Backdoors"The Russian state-sponsored hacking group Gamaredon, also known as Armageddon or Shuckworm, continues to target critical organizations in Ukraine's military and security intelligence sectors using updated tools and novel infection techniques. Previously…
-
"Cybercriminals Return to Business as Usual in a Post-pandemic World"According to Proofpoint, cybercriminals resumed normal operations in 2022 following two years of pandemic-induced disruption. As COVID-19 medical and economic programs began to slow down, attackers were forced to find new ways to make a living by…
-
"'Shampoo' ChromeLoader Variant Difficult to Wash Out"Fake websites promoting pirated video games, movies, and more are spreading a new variant of the ChromeLoader malware called "Shampoo." It steals sensitive information, redirects searches, and injects advertisements into browser sessions. Researchers…
-
"Detecting Deviators From the Norm - 'An Accurate Identification Method of Abnormal Users in Social Network Based on Multivariate Characteristics'"Research published in the International Journal of Web Based Communities introduces a new method for identifying abnormal users in social networks, which involves analyzing multiple user behavior characteristics. Using the APIs of different social…
-
"MSSQL Makes up 93% Of All Activity on Honeypots Tracking 10 Databases"Honeypots focused on tracking the activity on database servers in Russia, Ukraine, Poland, the UK, China, and the US revealed that Microsoft SQL (MSSQL) composed 93 percent of all attack activity. SpiderLabs of Trustwave noted in a blog post that its…
-
"Popular Email Provider Leaves Systems Wide Open"The popular disposable email provider Temp Mail left its systems publicly accessible for over three months, thus risking potential security breaches and widespread malware distribution. The Cybernews research team recently discovered a configuration…
-
"Spotify Fined $5 Million for Breaching EU Data Rules"Music streaming giant Spotify, was recently fined 58 million kronor ($5.4 million) for not properly informing users on how data it collected on them was being used, Swedish authorities said. Spotify said it planned to appeal the decision. The…
-
"SAP Patches High-Severity Vulnerabilities With June 2023 Security Updates"SAP on Tuesday announced the release of eight new security notes as part of its June 2023 Security Patch Day, including two notes that address high-severity vulnerabilities. Five other notes were updated. The most important of SAP’s new…
-
"Cyber Win: NSA Selects LSU to Build Cybersecurity Clinic to Support Small Businesses in Louisiana"The National Security Agency (NSA) has selected Louisiana State University (LSU) as the first university in the US to develop and pilot a cyber clinic to help protect small businesses, which are becoming increasingly frequent targets of cyberattacks. The…