News
-
"NIST Wants to Mitigate Smart Home Telehealth Cybersecurity Risks"The COVID-19 pandemic increased the use of Internet of Things (IoT) devices for telehealth purposes. However, using smart speakers to share sensitive personal health information for telehealth purposes may pose a cybersecurity and privacy risk, which the…
-
"Takedown of GitHub Repositories Disrupts RedLine Malware Operations"Cybersecurity researchers at ESET have discovered that the RedLine information stealer’s operations have recently been disrupted after the takedown of GitHub repositories used by the malware’s control panels. A piece of commodity malware active…
-
"Business Emails Hijacked by New QBot Banking Trojan Campaign For Distributing Malware"Researchers have discovered a new QBot malware campaign using compromised business communications to trick victims into installing the malware. Since April 4, 2023, the most recent activity has primarily targeted users in Germany, Argentina, Italy,…
-
"Apple's High Security Mode Blocked NSO Spyware, Researchers Say"A year ago, Apple introduced a new feature called Lockdown Mode for iPhone users who feared being targeted by sophisticated spyware, such as journalists and human rights activists. Researchers have now discovered evidence that Lockdown Mode helped thwart…
-
"Conversational Attacks Fastest Growing Mobile Threat"Security researchers at Proofpoint have warned of a 12-fold increase in reporting of so-called "conversational scams" like pig butchering last year, making them the fastest growing threat to mobile users in 2022. The researchers stated that such…
-
"NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers"The National Security Agency (NSA), the UK's National Cyber Security Centre (NCSC), the FBI, and the Cybersecurity and Infrastructure Security Agency (CISA) have collaborated to publish a joint Cybersecurity Advisory (CSA) report on the tactics,…
-
"Final Version of TIC Use Cases Covering Cloud Services"Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Email-as-a-Service (EaaS) have unique security considerations. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (…
-
"Pen Testers Need to Hack AI, but Also Question Its Existence"Samsung has prohibited some uses of ChatGPT, while Ford and Volkswagen have shut down their self-driving car company, and a letter calling for a halt to the training of more powerful Artificial Intelligence (AI) systems has received over 25,000…
-
"Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"MuddyWater, an Iranian threat actor, continues its time-tested practice of using legitimate remote administration tools to seize control of targeted systems. While the nation-state group previously used ScreenConnect, RemoteUtilities, and Syncro, a new…
-
"The Attacks That Can Target Your Windows Active Directory"Active Directory (AD) remains the predominant source of Identity and Access Management (IAM) in the enterprise, making it the target of numerous attacks. There are multiple attack techniques and attack vectors that hackers use to target AD. Different…
-
"Pre-Pandemic Techniques Are Fueling Record Fraud Rates"According to Pindrop, the rise and adoption of Artificial Intelligence (AI), an impending recession, and the return of pre-pandemic fraud techniques are driving record rates of fraud attacks against consumers and businesses. States with restrictions on…
-
"Cyber Intrusion Detection Time at an All-Time Low"Security researchers at Google's Mandiant have found that organizations and their cyber defenders are getting better at detecting cyberattacks, but detection time still stands at 16 days. During the study, the researchers found that 2022 saw a…