News
-
The Science of Security 5 Hard ProblemsThe Science of Security 5 Hard ProblemsThe Principal Investigators (PIs) of the Science of Security Lablets in collaboration with NSA Research, developed the 5 Hard Problems as a measure to establish the beginnings of a common language and gau
-
"Fake WinRAR PoC Spread VenomRAT Malware"Unknown threat actors have published a fake proof-of-concept (PoC) exploit for CVE-2023-4047, a recently patched Remote Code Execution (RCE) flaw in WinRAR, in order to spread the VenomRAT malware.
-
"Data Breach Reveals Distressing Info: People Who Order Pineapple on Pizza"Pizza Hut Australia recently announced that 190,000 customer's data had been accessed. The information unauthorized entities accessed included customers' names, delivery addresses, email addresses, phone numbers, and order histories.
-
"Scams Now Make Up 75% of Cyber Threats"According to security researchers at Norton, scams involving human manipulation comprised 75% of all desktop threats in the first half of 2023.
-
"Bot Attack Costs Double to $86m Annually"According to security researchers at Netacea, the typical business in the US and UK loses over 4% of their online revenue every year due to malicious bot attacks.
-
"T-Mobile App Glitch Let Users See Other People's Account Info"T-Mobile customers reported being able to see the account and billing information of others after logging into the company's official mobile app.
-
"Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers"A financially motivated threat actor has been identified as an Initial Access Broker (IAB) who sells access to compromised organizations to other adversaries to perform follow-on attacks.
-
"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"As growing and maturing data services demand faster Internet speeds and operating systems call for better security, hackers and adversaries continue to interfere. For some, this involves infiltrating home and office wireless networks to steal personal or…
-
"The Life-or-Death Importance of Medical Device Security"Cybersecurity researcher Alex Vakulov emphasizes that cybersecurity is not always a top priority when developing smart medical devices. Many are easily connected to the Internet, are often found to have simple passwords, and occasionally do not require…
-
"P2Pinfect Botnet Targets Redis and SSH Services"P2Pinfect, a novel peer-to-peer botnet that targets the Redis and SSH open-source services, has experienced a 600-time increase in activity since August 28, including a 12.3 percent increase in traffic over the past week. According to Cado Security Labs…
-
"Research Warns Email Rules Are Being Weaponized by Cyberattackers"The cloud cybersecurity company Barracuda Networks has released new research on attackers using malicious email rules to steal information and avoid detection after compromising corporate networks. Automated email inbox rules help manage the flood of…