News
-
"iOS Security Update Patches Exploited Vulnerability in Older iPhones"Apple recently announced fresh security updates for macOS and iOS, including patches that address an exploited vulnerability in older iPhone models. The issue tracked as CVE-2023-23529 was initially addressed as a zero-day in mid-February, with the…
-
"Four Years Behind Bars for Prolific BEC Scammer"A Nigerian man has recently been handed a four-year jail sentence for his role in a multinational criminal gang that scammed countless individuals and businesses over several years. Solomon Ekunke Okpe, 31, of Lagos, worked with others on business…
-
"Toyota Scrambles to Patch Customer Data Leak"Toyota Italy leaked sensitive information for over one-and-a-half years, until March of this year. It revealed secrets for its Salesforce Marketing Cloud and Mapbox Application Programming Interfaces (APIs). On February 14, the Cybernews research team…
-
"Exchange Online to Block Emails from Vulnerable On-Prem Servers"Microsoft is implementing a new security feature for Exchange Online that will automatically start throttling and eventually block all emails sent from "persistently vulnerable Exchange servers" 90 days after the admins are pinged to secure them. These…
-
"Biden Administration Limits Commercial Spyware Use in Federal Government"President Joe Biden has signed an executive order prohibiting federal agencies from using commercial spyware that poses a security risk to the US or has already been abused by foreign actors. The executive order, which has been in the works for months,…
-
"Balancing Security Risks and Innovation Potential of Shadow IT Teams"Shadow Information Technology (IT) teams, also known as rogue IT teams, have become more prevalent in recent years because of the rise of cloud-based apps and remote work. This has led to operational stress and security risks within many companies.…
-
"Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare"Based on a DMCA Takedown request filed on March 24, some of Twitter's proprietary source code had been publicly accessible on GitHub for nearly three months. On March 24, GitHub honored a Twitter employee's request to remove "proprietary source code for…
-
"Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe"A new phishing campaign is targeting European entities to distribute Remcos RAT and Formbook using DBatLoader, a malware loader. According to Zscaler researchers, the malware payload is delivered through WordPress websites with authorized SSL…
-
"Diffusion Models Can Be Contaminated with Backdoors, Study Finds"In the past year, interest has increased in generative Artificial Intelligence (AI) - deep learning models that can generate text, images, and other forms of content. However, like with every technological breakthrough, generative AI poses new security…
-
"CyLab Researchers Earn NSF CAREER Awards"Three researchers at CyLab, Carnegie Mellon University's security and privacy institute, recently received National Science Foundation (NSF) Faculty Early Career Development Program (CAREER) awards. Wenting Zheng, an assistant professor in the Computer…
-
"Indian Police Charge Gang With Stealing 168M Citizens' Data"Six members of an alleged criminal gang that sold the personal information of 168 million Indian individuals, including defense personnel and government employees, were apprehended by the Indian police. The criminal gang operated under three front…
-
"UK Crime Fighters Wrangle 'Several Thousand' Potential Cyber Criminals in DDoS-For-Hire Honeypot"After falling for a UK law enforcement honeypot operation, thousands of suspected cybercriminals have revealed their identities. The National Crime Agency (NCA) of the UK created a fake Distributed Denial-of-Service (DDoS)-for-hire website that prompted…