"Study Finds Thousands of Browser Extensions Compromise User Data"

"Study Finds Thousands of Browser Extensions Compromise User Data"

The extraction of sensitive user data from web pages by thousands of browser extensions poses significant privacy risks, as revealed by research conducted by Georgia Tech. This underscores the need for more robust privacy measures and improved enforcement. A team of researchers led by Frank Li, assistant professor in the School of Cybersecurity and Privacy and the School of Electrical and Computer Engineering, and Ph.D. student Qinge Xie, developed a new system to monitor browser extensions' collection of user content from web pages.

Submitted by Gregory Rigby on

"AI Expert Awarded $400,000 NSF Grant for Cybersecurity Research in Mobile Health"

"AI Expert Awarded $400,000 NSF Grant for Cybersecurity Research in Mobile Health"

Dr. Honggang Wang, an Artificial Intelligence (AI) and digital health applications expert, received a three-year National Science Foundation (NSF) grant to improve cybersecurity education and research in mobile health. The project titled "Augmenting Cybersecurity Education in Mobile Health (mHealth) Through Curriculum and Experimental Platform Development" will introduce a new mobile health cybersecurity course with detailed modules covering wearable device security, body sensor network security, trustworthy AI, and more. Dr.

Submitted by Gregory Rigby on

"NFL Teams Block & Tackle Cyberattacks in a Digital World"

"NFL Teams Block & Tackle Cyberattacks in a Digital World"

The National Football league has more to contend with than the actual games on the field. The teams have experienced cyberattacks on their customers, players, arenas, and data. In today’s digital age, the companies are protecting their assets that control the game and connecting with their fans as well as handling everything from concession sales, stadium operations, loyalty programs, bio-metric check-ins at stadiums, and WI-FI in the stands. Fan information, real-time player data, video broadcast, and their brands all need to be protected.

Submitted by Gregory Rigby on

"An Improved Continuous and Discrete Harris Hawks Optimiser Applied to Feature Selection for Image Steganalysis"

"An Improved Continuous and Discrete Harris Hawks Optimiser Applied to Feature Selection for Image Steganalysis"

Ankita Gupta, Rita Chhikara, and Prabha Sharma of the NorthCap University in Gurugram, India, have introduced a new method for detecting hidden messages in digital images. Their work advances steganalysis, a key field in cybersecurity and digital forensics. Steganography involves embedding data within media (e.g., words hidden in a digital image's bits and bytes). There are legitimate uses of steganography, but there may be more malicious ones, so law enforcement and security need effective detection.

Submitted by Gregory Rigby on

"Germany Seizes 47 Crypto Exchanges Used by Ransomware Gangs"

"Germany Seizes 47 Crypto Exchanges Used by Ransomware Gangs"

German authorities seized 47 cryptocurrency exchange services hosted in the country, which facilitated ransomware groups' illegal money laundering activities. The platforms enabled users to exchange cryptocurrencies without complying with applicable "Know Your Customer" regulations, ensuring that users remained completely anonymous during transactions. This created a low-risk environment where cybercriminals could launder their proceeds without fear of being prosecuted or tracked. This article continues to discuss the seizure of 47 cryptocurrency exchanges used by ransomware groups.

Submitted by Gregory Rigby on

"Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones"

"Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones"

Law enforcement agencies in Europe and Latin America have dismantled "iServer," a Phishing-as-a-Service (PhaaS) platform used by criminals to unlock stolen and lost phones. "Operation Kaerb" led to the dismantling of iServer, which targeted over 1.2 million mobile phones and made over 480,000 victims. According to investigators, there have been 483,000 victims, mostly Spanish-speaking nationals in European, North American, and South American countries. This article continues to discuss the iServer PhaaS platform used by criminals to harvest credentials and unlock phones.

Submitted by Gregory Rigby on

"DOJ Charges Hackers for Stealing $230 Million in Crypto From Individual"

"DOJ Charges Hackers for Stealing $230 Million in Crypto From Individual"

Two people have been charged by the US Department of Justice (DOJ) for stealing over $230 million in cryptocurrency from an individual in Washington, DC. Malone Lam and Jeandiel Serrano are accused of stealing cryptocurrency and trying to launder the proceeds through exchanges and mixing services. The two would hack cryptocurrency accounts and transfer funds to wallets controlled by them, using Virtual Private Networks (VPNs) and other tools to hide. This article continues to discuss the hackers charged for the theft of $230 million in cryptocurrency.

Submitted by Gregory Rigby on

"'Marko Polo' Hackers Found to Be Running Dozens of Scams"

"'Marko Polo' Hackers Found to Be Running Dozens of Scams"

Researchers with the Recorded Future Insikt Group reported that a prolific group of threat actors known as "Marko Polo" is responsible for at least 30 cybercrime scams, including malware attacks, phishing attacks, and cryptocurrency fraud. The group's schemes have hit tens of thousands of victims. They have targeted cryptocurrency influencers and online gaming personalities using social engineering techniques. This article continues to discuss findings regarding the Marko Polo hackers.

Submitted by Gregory Rigby on
Subscribe to