News
-
"How Digital Twins Could Protect Manufacturers From Cyberattacks"Digital twins, which are detailed virtual copies of physical objects, are paving the way for better products in healthcare, aerospace, and other industries. A new study suggests that cybersecurity may also fit perfectly into the digital twin portfolio.…
-
"TikTok Banned From EU Commission Phones Over Cybersecurity"The European Union's executive branch said Thursday that it has temporarily banned TikTok from phones used by employees as a cybersecurity measure, reflecting widening worries from Western officials over the Chinese-owned video-sharing app. The…
-
"The Number of Devices Infected by the MyloBot Botnet Is Rapidly Increasing"The MyloBot botnet has been in operation since 2017 and was first detailed in 2018 by the cybersecurity firm Deep Instinct. MyloBot is described as an evasive Windows botnet that employs sophisticated anti-analysis methods. The first sample of the bot…
-
"New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency"An active malware campaign has been targeting Facebook and YouTube users through a new information stealer aimed at taking over accounts and exploiting system resources for cryptocurrency mining. Bitdefender dubbed the malware S1deload Stealer due to its…
-
"Russian Accused of Developing NLBrute Malware Extradited to US"A Russian national accused of developing a piece of malware named NLBrute has recently been extradited to the United States from the Eastern European country of Georgia. The suspect, Dariy Pankov, aka dpxaker, was extradited from Georgia in October…
-
"Clasiopa Hackers Use New Atharvan Malware in Targeted Attacks"Researchers have spotted a hacker group, tracked as Clasiopa, targeting companies in the materials research industry with a Remote Access Trojan (RAT) called Atharvan. According to Symantec, there are clues pointing to Clasiopa being an Indian threat…
-
"Researchers Find Vulnerabilities in Hundreds of Docker Containers"Rezilion discovered hundreds of Docker container images with vulnerabilities that are not recognized by most standard vulnerability scanners and Software Composition Analysis (SCA) tools. Several high-severity/critical vulnerabilities were discovered in…
-
"Cisco Patches High-Severity Vulnerabilities in ACI Components"Cisco recently informed customers about the availability of patches for two high-severity vulnerabilities affecting components of its Application Centric Infrastructure (ACI) software-defined networking solution. Cisco noted that one of these flaws…
-
"Scammers Mimic ChatGPT to Steal Business Credentials"Scammers are capitalizing on the popularity of ChatGPT, an Artifical Intelligence (AI) for Natural Language Processing (NLP), by impersonating it in order to infect victims with Fobo Trojan malware and steal corporate account login information.…
-
"Professor Aims to Make Connected Vehicles More Reliable and Secure against Quantum Attacks"The advanced wireless systems that make driver assistance and autonomous driving systems possible are vulnerable to cyberattacks. Hanif Rahbari, assistant professor of computing security at Rochester Institute of Technology, was recently awarded the…
-
"Using Chatter on the Grapevine to Ace Cybersecurity Report Card"Attackers continue to change their techniques to evade security solutions implemented by targeted organizations, making it increasingly difficult to defend against cyberattacks. Therefore, cybersecurity experts at the University of New South Wales (UNSW…
-
"NSA Releases Best Practices for Securing Your Home Network"The National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) titled "Best Practices for Securing Your Home Network" to help remote workers improve the security of their home networks from malicious cyber actors. In the age of…