News
-
"Health Data Breaches on the Rise"A recent study highlights the increasing number of data breaches faced by healthcare providers, health care plans, and businesses in association with healthcare. The exposure of health data could lead to the financial gain of hackers as such data…
-
"How 50 Million Facebook Users Were Hacked"Facebook recently shared details pertaining to how hackers were able to compromise its servers and take control over 50 million users’ accounts. It was reported that hackers exploited a combination of three security vulnerabilities related to a Facebook…
-
"Connected Car Security Is Improving, Researchers Say"Findings of a report recently released by IOActive indicate that there has been an improvement in the security of connected vehicles. According to the report, the number of critical-impact vulnerabilities, which could lead to the disruption of…
-
"Hackers Turn to Python as Attack Coding Language of Choice"A report released by Imperva brings attention to the increasing popularity of the Python programming language amongst attackers in the development of attack tools. According to the report, an estimate of 77 percent of attacks against sites observed by…
-
"ESET Has Discovered the First UEFI Rootkit in the Wild"ESET security researchers have found a Unified Extensible Firmware Interface (UEFI) rootkit. The UEFI rootkit, called LoJax, has been reported to be the first of its kind to be discovered in the wild by researchers. This article continues to discuss the…
-
"UBC Study: Publicizing a Firm's Security Levels May Strengthen Security over Time"As cyberattacks continue to increase in number and complexity, organizations need to be more aware of their security issues. Findings of a study conducted by researchers at UBC Sauder School of Business call for the security awareness of organizations to…
-
"New Virobot Ransomware and Botnet Emerges"A new threat called Virobot was recently discovered by security researchers at Trend Micro. Virobot has the capabilities of both ransomware and botnets in that it encrypts files and adds the infected machine to a spam botnet. Trend Micro researchers have…
-
"Mobile Websites Can Tap Into Your Phone's Sensors Without Asking"Researchers have discovered that many mobile websites have been accessing smartphone sensors such as those used for motion, light, and proximity, without the permission of users. These websites include Wayfair, Priceline, Kayak, and more. This article…
-
"A New Cybersecurity Research Group Focuses on Human Behavior"Human behavior is the focus of the Evidence-based Cybersecurity Research Group led by David Maimon at Georgia State University. The research conducted by this group delves deeper into the interactions of major actors in the cybercrime ecosystem, which…
-
"Security Researcher Fined for Hacking Hotel Wi-Fi and Putting Passwords on the Internet"A security researcher named Zheng Dutao was recently fined as a result of an unauthorized hack into a hotel’s Wi-Fi system and publishing of a blog post pertaining to the hack. The incident highlights the importance of properly disclosing security issues…
-
"Think Like An Attacker: How a Red Team Operates"An organization can bolster their defenses against cyber threats through the establishment of a red team. A red team finds different ways in which threat actors could compromise an organization by acting as the adversaries. This article continues to…
-
"Why Humans Are Necessary to the Threat Hunting Process"Human Intelligence (HUMINT) is a source of intelligence that is often disregarded in the performance of cyber threat intelligence gathering. The gathering of human intelligence can help in defending organizations from cyberattacks in the long term.…