News
-
"Unveiling the Risks of Routing Protocols"Routing protocols are essential to the functioning of the Internet and the services that rely on them. However, many of these protocols were created without security in mind. Initially, the Border Gateway Protocol (BGP) did not account for the…
-
"Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now"The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) issued a warning that cyber actors could target the US' most sensitive information now and use future…
-
"Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang"The BlackCat/ALPHV ransomware group has added Seiko to its leak website, claiming responsibility for a cyberattack disclosed by the Japanese company. Seiko is one of the largest and oldest watchmakers in the world, with around 12,000 employees and an…
-
"New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC"A high-severity security vulnerability has been found in the WinRAR utility, which a threat actor could exploit for Remote Code Execution (RCE) on Windows systems. The vulnerability, tracked as CVE-2023-40477 with a CVSS score of 7.8, stems from improper…
-
"Organizations Invest in AI Tools to Elevate Email Security"According to IRONSCALES and Osterman Research, specialized email security vendors are leveraging a combination of Artificial Intelligence (AI) and human insights to improve email security and combat emergent threat methods enhanced by AI. The threat…
-
"Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs"Australian financial services company Latitude Financial recently reported that the cyberattack disclosed earlier this year has cost it tens of millions of dollars. In a financial report covering the first half of 2023, the consumer lender reported…
-
"Tesla Discloses Data Breach Related to Whistleblower Leak"Tesla has recently disclosed a data breach impacting roughly 75,000 people, but the incident is the result of a whistleblower leak rather than a malicious cyberattack. Tesla recently told US authorities that a data breach discovered in May resulted…
-
"Cuba Ransomware Group Steals Credentials Via Veeam Exploit"According to security researchers at BlackBerry, a notorious Russian-speaking ransomware group has updated its attack tooling to include a Veeam exploit designed to harvest logins. The researchers stated that their discovery came from…
-
"Research Hack Reveals Call Security Risk in Smartphones"Advanced smartphone features entice users who want more from their devices, especially in regard to health and entertainment, but the question is whether these features pose a security risk when making or receiving actual calls. A team of researchers…
-
"Android Browsers Threaten User Privacy, Says Khoury-Led International Research Team"In a recent study titled "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers," Amogh Pradeep, a doctoral student at Khoury College, and his multinational research team set out to examine the personal data collected by browsers and…
-
"MRU Researchers Share Insights on How to Combat Hybrid-Cyber-Attacks"Due to their complexity, hybrid cyber threats are dangerous. Oftentimes, cyberattacks are accompanied by an information component designed to achieve specific objectives, such as misleading the public or convincing them of things favorable to the nation…
-
"Bug Hunter’s Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem"A team led by the University of Maryland received a distinguished paper award for examining the challenges encountered by bug bounty hunters or ethical hackers who discover and report vulnerabilities or bugs to a platform's developer. The paper, titled "…