News
-
"5G Cellular Security Research"A team of researchers from the University of Colorado (CU) Boulder is leading a project for 5G wireless security.
-
"Metaverse Poses Serious Privacy Risks for Users, Report Warns"According to a new report from New York University (NYU), the immersive Internet experience known as the metaverse will erode users' privacy unless significant measures are taken to improve and regulate how the technology collects and stores personal d
-
"KEV Catalog Reaches 1,000, What Does That Mean and What Have We Learned"The US Cybersecurity and Infrastructure Security Agency (CISA) launched the Known Exploited Vulnerabilities (KEV) catalog in November 2021 to provide an authoritative source of vulnerabilities that have been exploited "in the wild." Recently, the catal
-
"APT36 State Hackers Infect Android Devices Using YouTube App Clones"The APT36 hacking group, also known as Transparent Tribe, has been using at least three YouTube-mimicking Android apps to infect devices with their signature Remote Access Trojan (RAT) called CapraRAT.
-
"CISA Sponsors Hack the Building 2.0 Hospital Competition"The US Cybersecurity and Infrastructure Security Agency (CISA) and the National Centers of Academic Excellence in Cybersecurity (NCAE-C) have sponsored the Hack the Building 2.0: Hospital Edition competition at the Maryland Innovation and Security Inst
-
"Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities"Earth Lusca, a threat actor with ties to China, has been observed targeting government organizations with a new Linux backdoor called SprySOCKS.
-
"Companies Still Don't Know How to Handle Generative AI Risks"According to the Information Services Group (ISG), companies are actively pursuing practical applications of generative Artificial Intelligence (AI) technology while staying mindful of its risks.
-
"'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks"Two Middle Eastern telecommunications organizations were recently compromised by a potentially novel threat actor using two backdoors with new methods for covertly loading malicious shellcode onto a target system.
-
"Unhooking Phishing Threats - The Detection of Phishing Attempts in Communications Systems"There is a new approach to combating phishing attacks to improve online security, reduce cybercrime against individuals and businesses, and prevent attacks against governments.
-
"A New and Inclusive Approach to Privacy Technology Is Needed to Keep Users Safe Online"The UK's Online Safety Bill (OSB) will introduce several new digital regulations and offenses, but uncertainties persist regarding the future of online safety.
-
"New Proposal Aims to Boost IoT Security With a Sticker"The Federal Communications Commission (FCC) has proposed a cybersecurity labeling program to protect smart device users.
-
"German Spy Chief Warns of Cyberattacks Targeting Liquefied Natural Gas Terminals"Bruno Kahl, the head of Germany's foreign intelligence service, warned that state-sponsored hackers could target the country's Liquefied Natural Gas (LNG) terminals.