-
"Top Cybersecurity Evasion and Exfiltration Techniques Used by Attackers"A report conducted by SS8 called the 2018 Threat Rewind Report, highlights the top techniques used by attackers to evade cybersecurity measures and exfiltrate data from networks. These techniques could be used by attackers to access and steal data from…
-
"Symantec: Look for Cryptojacking to Tie into IoT Devices"According to Symantec's newest yearly report, there is expected to be an increase of unauthorized cryptomining via IoT devices as cryptojacking attacks and IoT attacks have grown significantly in 2017. Although IoT devices have less processing power for…
-
"Exposed: The Path of Ransomware Payments"A new study led by cybersecurity researcher at NYU Tandon, Damon McCoy, reveals details pertaining to the ransomware payment ecosystem. Key findings of the study highlight those that are most impacted by ransomware campaigns, which bitcoin exchange…
-
-
Cyber Scene #19 - The Russians: Vlad the Cyber ImpalerCyber Scene #19 The Russians: Vlad the Cyber Impaler
-
"To Better Protect Themselves, Universities Partner on Cybersecurity"A partnership has been made between Indiana University and four other Big Ten institutions in support of improving upon the detection and monitoring of cyber threats, as well as the sharing of information pertaining to such threats. OmniSOC is a security…
-
"Researchers Find Leaky Apps That Put Privacy at Risk"Researchers have revealed security weaknesses contained by browser extensions, Android applications, and Facebook's advertisement system that pose a threat to the privacy of users. Although the Facebook advertisement system is not intended to reveal…
-
"AMD Says Patches on the Way for Flawed Chips"According to chip manufacturer, AMD, the critical security vulnerabilities recently revealed by CTS Labs to be contained by some AMD chips will soon be fixed with firmware patches and a BIOS update. AMD assures that the security flaws will be fixed…
-
"Hack the State Department Bill Introduced"The Hack Your State Department Act has been introduced by U.S. congressmen, Ted Lieu, D-Calif., and Ted Yoho, R-Fla. The proposed bill aims to develop a bug bounty program in which ethical hackers would be invited to identify and disclose security…
-
“A ‘Tamper-Proof’ Currency Wallet Just Got Backdoored by a 15-Year-Old”Salem Rashid, a 15-year-old programmer from the UK, demonstrated the possibility of obtaining private keys from the popular Ledger hardware wallet, which is used to store cryptocurrencies. Vulnerabilities contained by the Ledger Nano S…
-
"Tricks That Cybercriminals Use to Hide in Your Phone"Cybercriminals are developing new ways in which they distribute malicious apps as well as conceal the code and activities associated with such apps. Social engineering or technical mechanisms could be used to strengthen the performance of malicious…
-
"F-Secure Looks to Address Cyber Security Risks in Aviation Industry"As the technology used within the aviation industry becomes increasingly connected to the internet, cyber risks rise. In order to improve upon the security of aircraft, infrastructure, data, and reputation within the aviation industry, F-Secure is…
News