News
-
"Okta Breached Via Stolen Credential"Identity and access management (IAM) specialist Okta has recently found itself on the receiving end of another security breach after a threat actor was able to access a stolen credential.
-
"Your Browser Extension Could Grab Your Password and Sensitive Info"A team of digital security researchers at the University of Wisconsin-Madison discovered that some widely used websites are vulnerable to browser extensions capable of extracting sensitive information from HTML code, including passwords, credit card nu
-
"ICC: September Breach Was Espionage Raid"The International Criminal Court (ICC) has recently revealed that a September cyberattack on its IT systems was a highly targeted espionage attempt, although attribution thus far remains elusive.
-
"Cybersecurity: IMC2 Researchers Mobilize to Counter Insider Threats"Polytechnique Montréal has announced a cybersecurity project to prevent insider threats.
-
"CIA Exposed to Potential Intelligence Interception Due to X's URL Bug"Kevin McSheehan, an ethical hacker, took over a Central Intelligence Agency (CIA) Telegram channel used to receive intelligence by exploiting a flaw in how X, formerly Twitter, truncates URLs.
-
"Legacy Authentication Leads to Growing Consumer Frustration"According to FIDO Alliance, consumers want stronger, more user-friendly alternatives to passwords despite their continued widespread use.
-
"Iran-Backed Hackers Dwelled for 8 Months in Mideast Government's System"According to researchers, Iran-backed hackers spent eight months inside the systems of a Middle East government, stealing emails and files.
-
"ExelaStealer: A New Low-Cost Cybercrime Weapon Emerges"ExelaStealer, a new information stealer, has joined the field of off-the-shelf malware designed to steal sensitive data from compromised Windows systems.
-
"The Most Popular IT Admin Password Is Totally Depressing"The analysis of over 1.8 million pages identified as admin portals found that 40,000 of them used "admin" as its password, making it the most common credential used by Information Technology (IT) administrators.
-
"BlackCat Ransomware Uses New 'Munchkin' Linux VM in Stealthy Attacks"The BlackCat/ALPHV ransomware operation is now applying a new tool named Munchkin, which uses Virtual Machines (VMs) to stealthily launch encryptors on network devices.
-
"QR Codes Used in 22% of Phishing Attacks"A new study called the "Hoxhunt Challenge" has unveiled alarming trends in employee susceptibility to phishing attacks, emphasizing the critical role of engagement in reducing human risk.
-
"DarkGate Malware Campaigns Linked to Vietnam-Based Cybercriminals"Security researchers at WithSecure believe that Vietnam-based cybercriminals are behind attacks using DarkGate malware, which have targeted organizations in the UK, US, and India since 2018.