News
-
"The Emergence of Security Flaws as a 'National Resource' in China"A regulation requiring organizations conducting business in China to notify the government of software vulnerabilities within 48 hours of discovery reflects the Chinese government's increasingly strategic view of security flaws. A new report published by…
-
"Nation-State Actors Are Exploiting AI for Discord and Attacks, DHS Warns"A recently released report from the Department of Homeland Security (DHS) warns that nation-state actors and cybercriminals are increasingly using new cyber tools, such as generative Artificial Intelligence (AI), to incite conflict in the US, exploit…
-
"AI Under Criminal Influence: Adversarial Machine Learning Explained"Since the release of ChatGPT to the public, the adoption of Artificial Intelligence (AI) and Machine learning (ML) systems has increased significantly. In order to gain a competitive advantage, companies are racing to adopt AI technology. However, they…
-
"Cybersecurity Incident Hits ICC"The International Criminal Court (ICC) has recently announced that it had been affected by what it called “anomalous activity” regarding its IT systems and that it was currently responding to this “cybersecurity incident.” The ICC is currently…
-
"Metaverse Poses Serious Privacy Risks for Users, Report Warns"According to a new report from New York University (NYU), the immersive Internet experience known as the metaverse will erode users' privacy unless significant measures are taken to improve and regulate how the technology collects and stores personal…
-
"KEV Catalog Reaches 1,000, What Does That Mean and What Have We Learned"The US Cybersecurity and Infrastructure Security Agency (CISA) launched the Known Exploited Vulnerabilities (KEV) catalog in November 2021 to provide an authoritative source of vulnerabilities that have been exploited "in the wild." Recently, the catalog…
-
"APT36 State Hackers Infect Android Devices Using YouTube App Clones"The APT36 hacking group, also known as Transparent Tribe, has been using at least three YouTube-mimicking Android apps to infect devices with their signature Remote Access Trojan (RAT) called CapraRAT. Once the malware has been installed on a victim's…
-
"CISA Sponsors Hack the Building 2.0 Hospital Competition"The US Cybersecurity and Infrastructure Security Agency (CISA) and the National Centers of Academic Excellence in Cybersecurity (NCAE-C) have sponsored the Hack the Building 2.0: Hospital Edition competition at the Maryland Innovation and Security…
-
"Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities"Earth Lusca, a threat actor with ties to China, has been observed targeting government organizations with a new Linux backdoor called SprySOCKS. Trend Micro first documented Earth Lusca in January 2022, detailing the adversary's attacks against public…
-
"Companies Still Don't Know How to Handle Generative AI Risks"According to the Information Services Group (ISG), companies are actively pursuing practical applications of generative Artificial Intelligence (AI) technology while staying mindful of its risks. Eighty-five percent of companies surveyed by ISG believe…
-
"'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks"Two Middle Eastern telecommunications organizations were recently compromised by a potentially novel threat actor using two backdoors with new methods for covertly loading malicious shellcode onto a target system. Cisco Talos dubbed the intrusion set "…
-
"Threat Actor Claims Major TransUnion Data Breach"A notorious threat actor linked to previous big-name breaches has recently released several gigabytes of personal data stolen from credit agency TransUnion. According to security researchers at Vx-underground, an individual who goes by the moniker…