News
  • "Decoy Dog Malware Upgraded to Include New Features"
    Security researchers at Infoblox have released crucial updates on the “Decoy Dog” remote access trojan (RAT) toolkit in a new threat report published today.   Decoy Dog was initially discovered and disclosed in April 2023.  Decoy Dog has proven…
  • "Sneaky Python Package Security Fixes Help No One – Except Miscreants"
    According to computer security researchers, Python security fixes are often implemented through "silent" code commits without an associated Common Vulnerabilities and Exposures (CVE) identifier. That is not ideal, they argue, because attackers like…
  • "No, Criminals Are Not in Love With VPNs, Expert Insists"
    CrowdSec analyzed data on malicious Internet Protocol (IP) addresses and discovered that most malicious activity stems from Russia, the US, and India. Over one million IP addresses in each of these countries have been reported as malicious. However,…
  • "CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"
    According to a new report from the US Cybersecurity and Infrastructure Security Agency (CISA), more than half of all cyberattacks against government agencies, critical infrastructure organizations, and state-level government bodies involved legitimate…
  • "Over 900,000 MikroTik Routers Exposed to Critical Bug"
    Security researchers at VulnCheck have warned that hundreds of thousands of routers produced by Latvian networking equipment maker MikroTik are vulnerable to a critical bug that could enable attackers to remotely control affected devices.  The…
  • "Education Sector Has Highest Ransomware Victim Count"
    According to security researchers at Sophos, the education sector recorded a higher share of ransomware victims than any other in 2022.  During the study, the researchers conducted interviews with 400 IT and cybersecurity leaders globally, split…
  • "Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets"
    Realst is a new malware family targeting Apple macOS systems. A third of the samples are already designed to infect macOS 14 Sonoma, the upcoming major release of the operating system. The malware is written in the Rust programming language and is…
  • "ALPHV Ransomware Adds Data Leak API in New Extortion Strategy"
    The ALPHV ransomware group, also known as BlackCat, is attempting to increase the pressure on their victims to pay a ransom by providing an Application Programming Interface (API) for their leak site in order to increase the visibility of their attacks.…
  • "Zero Trust Rated as Highly Effective by Businesses Worldwide"
    According to Beyond Identity, 82 percent of experts are currently working on implementing zero trust, and 16 percent plan to do so within the next 18 months. Over 90 percent of those working on zero trust cited the 2022 Federal Zero Trust Strategy as…
  • "ChatGPT, Other Generative AI Apps Prone to Compromise, Manipulation"
    Users of applications involving Large Language Models (LLMs) similar to ChatGPT must be aware of the possible risks. Researchers warn that an attacker who develops untrusted content for the Artificial Intelligence (AI) system could compromise any…
  • "Why Computer Security Advice Is More Confusing Than It Should Be"
    A new study identifies a key issue with developing computer security guidelines and outlines basic steps that would likely make computers safer. This research puts the computer security guidelines provided to employees by businesses and government…
  • "OpenAI, Google and More Agree to White House List of Eight AI Safety Assurances"
    Some of the largest US-based generative Artificial Intelligence (AI) companies plan to watermark their content, according to a White House fact sheet released on July 21. Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI have agreed to…