News
  • "As Phishing Gets Even Sneakier, Browser Security Needs to Step Up"
    Phishing attacks are becoming increasingly sophisticated, requiring more advanced detection methods. Din Serussi, manager of the incident response group at Perception Point, explained that this is because modern forms of phishing are more difficult to…
  • "Macs Are Getting Compromised to Act as Proxy Exit Nodes"
    AdLoad malware has been targeting macOS systems for over five years. It is now delivering a new payload that, unbeknown to the owners, enlisted their systems in a residential proxy botnet. Many devices are infected, according to threat intelligence…
  • "Ford Says Cars With Wi-Fi Vulnerability Still Safe to Drive"
    Ford warns of a buffer overflow vulnerability in the SYNC3 infotainment system used in many Ford and Lincoln vehicles, which could enable Remote Code Execution (RCE), but claims that vehicle safety is unaffected. SYNC3 is a modern infotainment system…
  • "Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."
    Researchers have uncovered a set of vulnerabilities that compromise a next-generation protocol designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings owned by federal, state, and local…
  • "Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping"
    Multiple security flaws in AudioCodes desk phones and Zoom's Zero Touch Provisioning (ZTP) could be exploited by an adversary to conduct remote attacks. Using the vulnerabilities discovered in AudioCodes desk phones and Zoom's ZTP feature, an external…
  • "Authorities Take Down Lolek Bulletproof Hosting Provider"
    Police have recently taken down a Lolek bulletproof hosting service criminals used to launch cyberattacks worldwide.  The takedown was part of a coordinated effort between the Polish Central Cybercrime Bureau and the US Department of Justice (DoJ),…
  • "SwRI Micropatch Algorithm Improves Ground-To-Spacecraft Software Update Efficiency"
    Southwest Research Institute (SwRI) has developed an algorithm to remotely update and fix spacecraft software using less time and data than other techniques. Not only does the tool improve the overall efficiency of satellite software transmissions, but…
  • "A Puzzling Approach to Encryption"
    An advancement in data security is discussed in the International Journal of Information and Computer Security. The Japanese puzzle known as Sudoku promises a cryptographic system for text information, which works even in situations where there is…
  • "Gootloader SEO Watering Hole Malware Targets Law Firms"
    Gootloader, a Search Engine Optimization (SEO) watering hole technique, has been observed targeting legal-related search terms. It has been identified as a threat to law firms and individuals conducting research online for legal information. According to…
  • "Federated Learning: How Private Is It Really?"
    Federated Learning (FL) is a popular structure that enables one to learn a Machine Learning (ML) model collaboratively. The classical FL structure involves multiple clients, each with their own local data that they may want to keep private, and a server…
  • "Multiple Flaws Found in the Avada WordPress Theme and Plugin"
    Multiple vulnerabilities have recently been identified in the widely used Avada theme and its accompanying Avada Builder plugin.  Security researchers at Patchstack discovered the flaws.  The researchers noted the Avada Builder plugin exhibits…
  • "CISA Discovered a New Backdoor, Named Whirlpool, Used in Barracuda ESG Attacks"
    Whirlpool, a new backdoor discovered by the US Cybersecurity and Infrastructure Security Agency (CISA), was used in attacks against Barracuda Email Security Gateway (ESG) devices. Barracuda, a provider of network security solutions, warned customers at…