News
-
"Hackers Use New PowerMagic and CommonMagic Malware to Steal Data"Researchers have discovered attacks by a sophisticated threat actor involving a previously unknown malicious framework called CommonMagic and a new backdoor called PowerMagic. Since at least September 2021, both pieces of malware have been used in…
-
"Custom 'Naplistener' Malware a Nightmare for Network-Based Detection"A group tracked by Elastic Security Labs as REF2924 is using new data-stealing malware, a C#-written HTTP listener named Naplistener, in attacks against victims in southern and southeast Asia. According to Elastic's senior security research engineer…
-
"Voice Deepfakes Are Calling – Here's What They Are and How to Avoid Getting Scammed"Security researchers have observed that advances in deep learning algorithms, audio editing, and synthetic voice generation are making it increasingly feasible to replicate a person's voice convincingly. In addition, Artificial Intelligence (AI)-driven…
-
"Only 15 Percent of Companies Are Ready for Cyber Threats"According to Cisco's first-ever Cybersecurity Readiness Index, only 15 percent of companies worldwide are at the 'Mature' level of readiness required to be resilient against today's advanced cybersecurity threats. Over half (55 percent) of companies fall…
-
"Security Researchers Double-Down on the Need to Patch VMware ESXi Servers"Security teams are urged to double-down on their efforts to patch the two-year-old VMware ESXi server vulnerability that impacted thousands of VMware customers. According to a blog post published by AT&T Cybersecurity on March 20, companies that have…
-
"ESF Partners, NSA, and CISA Release Identity and Access Management Recommended Best Practices for Administrators"As part of the Enduring Security Framework (ESF), the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released the "Recommended Best Practices Guide for Administrators" to provide system administrators with…
-
"Lionsgate Streaming Platform with 37M Subscribers Leaks User Data"According to research conducted by Cybernews, the entertainment industry giant Lionsgate leaked users' IP addresses and details about the content they have viewed on its movie-streaming platform. Researchers discovered that the movie-streaming platform…
-
"Google Flags Apps Made by Popular Chinese E-Commerce Giant as Malware"Google has identified multiple apps developed by a Chinese e-commerce giant as malware, informing users who have installed them and suspending the company's official app. Several Chinese security researchers have recently accused Pinduoduo, a rising e-…
-
"Associates in Dermatology Responds to Data Breach"Associates in Dermatology (AID), a healthcare provider with offices in New Albany and Clarksville, is notifying community members of a data breach issue. Recently the provider announced in a news release that Virtual Private Network (VPN) Solutions…
-
"Google Pixel Vulnerability Allows Recovery of Cropped Screenshots"Reverse engineers Simon Aarons and David Buchanan have discovered a vulnerability lurking in Google's Pixel phones for five years that allows for the recovery of an original, unedited screenshot from the cropped version of the image. Referred to as…
-
"Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant"Security researchers at Mandiant have analyzed the zero-day vulnerabilities disclosed in 2022 and found that over a dozen of them were used in attacks believed to have been carried out by cyberespionage groups. The researchers noted that the…
-
"Detecting Manipulations in Microchips"In addition to manipulating software, attackers can also tamper with hardware. Therefore, a team from Ruhr University Bochum (RUB), Germany, and the Max Planck Institute for Security and Privacy (MPI-SP) is developing techniques to detect such tampering…