News
-
"Cryptocurrencies: Shared Irresponsibility"Information Technology security is of utmost importance when using cryptocurrencies. Ultimately, money, like other data, is susceptible to cyberattacks. Professor Ghassan Karame, head of the Chair for Information Security at Ruhr University Bochum, is…
-
"Ransomware Group Claims Attack on Constellation Software"The Alphv/BlackCat ransomware group has recently claimed responsibility for a cyberattack that Canadian software company Constellation Software disclosed last week. Toronto-based Constellation Software is a company specializing in the acquisition…
-
"Cookie Consent Banners Need Improvement, May Not Be the Answer"Cookie consent banners appear, in some form, on nearly every website, but concerns remain as to whether users understand what they agree to when they select one of the available options or click the x button to close the banner. In order to comply with…
-
"CyberGhost VPN Patches Command Injection Vulnerability"CyberGhost VPN, a popular provider of Virtual Private Network (VPN) solutions, has patched a recently discovered command injection vulnerability that left Windows users' systems exposed to potential compromise. The difficulty with which the researcher…
-
"Eurovision 2023: A Goldmine for Cybercriminals"The return of Eurovision 2023 will occur on May 9, hosted by Liverpool on behalf of Ukraine. However, the excitement about this year's acts is accompanied by cybercriminals' eagerness to make money. This year's song contest again raises concerns about…
-
"1 Million Impacted by Data Breach at NextGen Healthcare"Healthcare solutions provider NextGen Healthcare has recently started informing roughly one million individuals that their personal information was compromised in a data breach. The company makes and sells electronic health records software and…
-
"ChatGPT and the New AI Are Wreaking Havoc on Cybersecurity in Exciting and Frightening Ways"Christopher Ahlberg, CEO of Recorded Future, emphasizes that cybercriminals are racing to discover powerful new hacks using Artificial Intelligence (AI). While defenders benefit from generative AI in bolstering cybersecurity, attackers also see the…
-
"The Attack on Colonial Pipeline: What We've Learned & What We've Done Over the Past Two Years"In 2021, a ransomware attack on Colonial Pipeline made news worldwide. Since then, the Biden-Harris Administration has taken significant steps in US cyber defense, leveraging the strength of the US government to address the full spectrum of the threat.…
-
"New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks"Users of the Advanced Custom Fields plugin for WordPress are urged to update to version 6.1.6. The plugin has been discovered to contain a vulnerability, tracked as CVE-2023-30777, which relates to reflected cross-site scripting (XSS). It could be…
-
"New Cactus Ransomware Encrypts Itself to Evade Antivirus"Cactus, a new ransomware operation, has been exploiting Virtual Private Network (VPN) appliance vulnerabilities to gain initial access to the networks of "large commercial entities." The Cactus ransomware operation has been active since at least March…
-
"Your Voice Could Be Your Biggest Vulnerability"Security researchers from McAfee Labs have revealed their findings and analysis from an in-depth study of Artificial Intelligence (AI) voice-cloning technology and cybercriminal use. According to McAfee, only three seconds of audio are required to clone…
-
"2 Years After Colonial Pipeline, US Critical Infrastructure Still Not Ready for Ransomware"Experts warn that efforts to counter the potentially crippling ransomware threat to US critical infrastructure have been insufficient. The cyberattack on Colonial Pipeline's Information Technology (IT) infrastructure caused it to cease operations for the…