-
“Hide 'N Seek IoT Botnet Caught Using Peer-To-Peer Communication”A new botnet called Hide N’ Seek (HNS) was recently discovered by Bitfender security researchers. According to researchers, the IoT botnet spreads to new victims and constructs its infrastructure through the use of custom-built Peer-to-Peer communication…
-
"Hackers Are Now Exploiting Youtube Ads to Hijack Your Computer and Secretly Mine Cryptocurrency"Security researchers at Trend Micro have discovered the exploitation of YouTube advertisements by hackers that allows a viewer's CPU power to be used to mine cryptocurrency. An analysis of YouTube advertisements revealed the use of Coinhive Javascript…
-
"Ransomware Actors Cut Loose on Health Care Organizations"Healthcare organizations are increasingly becoming the targets of ransomware attacks as indicated by recent attacks on Allscripts, Hancock Health, and Adams Health Network. Different variants of the infamous ransomware family called SamSam have been used…
-
Cyber Scene #17 - Accelerating Responsible Tech Driving into the FutureCyber Scene #17 Accelerating Responsible Tech Driving into the Future
-
-
"Researchers Propose Novel Solution to Better Secure Voice over Internet Communication"A new method to improve upon the security of Crypto Phones against eavesdropping attacks and other forms of man-in-the-middle attacks has been developed by researchers from the University of Alabama at Birmingham. Crypto Phones use end-to-end encryption…
-
"New Global Cybersecurity Center Announced at Davos"A new cyberthreat information sharing platform called the Global Centre for Cybersecurity was recently announced by the World Economic Forum. The objective of the platform is to combat emerging cybersecurity threats globally by improving upon the sharing…
-
"New Defenses Sought Against GPS Spoofing Attacks"Yongqiang Wang, an assistant professor of electrical and computer engineering at Clemson University, and his team of researchers will conduct research funded by the National Science Foundation to strengthen the security of computers and other devices…
-
"Bitcoin Wallet Devices Vulnerable to Security Hacks, Study Shows"Research conducted by a team of researchers at the University of Edinburgh suggests that better protection could be implemented for Bitcoin wallet devices. Researchers discovered security vulnerabilities within devices used to manage accounts on the…
-
"Cyber Attackers Exploiting Trust in FTP Servers"Researchers at Forcepoint Security Labs have observed the use of FTP sites to distribute malware. According to researchers, cyberattackers are turning to FTP sites instead of HTTP links for the distribution of malware as FTPs are considered to be trusted…
-
"Delaware Announces Innovative Cybersecurity Partnership for Young Women"A partnership between the SANS Institute and the State of Delaware was announced by Governor John Carney and Delaware’s Chief Information Officer (CIO) James Collins. The partnership is in support of providing cybersecurity training to young women in…
-
"National Cybersecurity Center Opens in Colorado"The National Cybersecurity Center (NCC), which aims to provide a central space for cybersecurity advancements, opened in Colorado Springs. The center is dedicated to cybersecurity research, as well as cybersecurity training and education for students,…
News