News
-
"The Toolset of an Elite North Korean Hacker Group On the Rise"FireEye released details pertaining to a North Korean hacking group dubbed APT37. According to security researchers, APT37 has mostly launched attacks on South Korean targets through the use of a wide range of penetration techniques and custom-written…
-
"Private Browsing Gets More Private"A new system called Veil was presented by researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) and Harvard University, which improves upon private browsing. Although web browsers in private-browsing mode temporarily…
-
"Software Beats Power Grid Hackers in Security Tests"Computer security experts at Johns Hopkins University have developed new software for controlling an electric power grid called Spire. Spire allows an electric power grid to continue operating even in the event that part of the control system is…
-
"Hackers Hijack Tesla's Amazon Cloud Account to Mine Crypto-Currency"Security researchers at RedLock have discovered the use of an Amazon cloud account by hackers to mine cryptocurrency. The attack follows a series of cryptojacking attacks that have been recently launched by hackers to secretly use a victim’s…
-
"Framework for Policymakers to Address Debate over Encryption"The National Academies of Sciences, Engineering, and Medicine released a new report in which a framework is provided to policymakers for the evaluation or creation of proposals to allow authorized government agencies access to encrypted information…
-
"Cybercrime Causes over $600 Billion in Damage Annually"According to a report released by the Center for Strategic and International Studies (CSIS) and McAfee, the total annual cost of damages resulting from cybercrime and espionage is more than $600 billion. The total annual cost of cybercrime is rising as…
-
"The State of Ransomware: Attacks Up, Payments Down as Firms Fight Back"The number of detected ransomware attacks continues to rise, however fewer businesses are giving into the demands of payment behind such attacks. Therefore, ransomware attacks have become increasingly persistent and destructive, hindering the process of…
-
"AutoSploit: Making Massive Cyber Attacks Too Easy?"A tool by the name of AutoSploit has raised some concern among the security community as it significantly eases the process of launching cyberattacks for less-skilled hackers. The tool takes advantage of the Shodan search engine to perform automated mass…
-
"Cyber Threat Intelligence Improves Prevention, Detection, and Response Capabilities"The SANS 2018 Cyber Threat Intelligence Survey sponsored by DomainTools reveals that organizations are increasingly embracing the use of Cyber Threat Intelligence (CTI) in the battle against cyberattacks and hackers. The report highlights the importance…
-
"Researchers Show Docker Containers at Risk for Crypto-Currency Attacks"Researchers at Aqau Security Software conducted an exercise in which the operation of cryptocurrency mining by cyberattackers within cloud containers is further explored. The process of installing Monero cryptocurrency mining malware onto Docker…
-
"International Hackers Find 106 Bugs in U.S. Air Force Websites"The U.S. Air Force recently launched a bug bounty competition to which 25 white-hat hackers participated. The ethical hackers uncovered security vulnerabilities contained by the branch’s public-facing websites. The discoveries made by participants will…
-
"Security Awareness Training Top Priority for CISOs: Report"The FS-ISAC’s 2018 Cybersecurity Trends Report indicate that employee training should be a top priority for CISOs in the improvement of cybersecurity within organizations in the financial sector. The report emphasizes the need for organizations to…