News
-
"More Than 300K People Affected by Johns Hopkins Data Breach"In June, Johns Hopkins University and Johns Hopkins Health System learned that their systems were among those affected by a broad-based cybersecurity attack that targeted a widely used software platform for transferring data files called MOVEit. …
-
"Computer Security Experts Offer Advice to Freeze Out Risk of Thermal Attacks"A team of computer security experts has devised a set of recommendations to defend against 'thermal attacks' that can steal personal information. Thermal attacks use heat-sensitive cameras to detect fingerprint traces left on surfaces such as smartphone…
-
"New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks"Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to launch the commodity malware XWorm. The attack chain, discovered by Fortinet FortiGuard Labs on July 13, 2023, begins with a phishing email containing a malicious PDF file…
-
"Lapsus$ Hackers Took SIM Swapping Attacks to the Next Level"The US Department of Homeland Security (DHS) Cyber Safety Review Board (CSRB) released a report after analyzing the techniques, such as SIM swapping, used by the Lapsus$ extortion group to breach dozens of organizations with a strong security posture. In…
-
"Threat Intelligence's Key Role in Mitigating Malware Threats"According to OPSWAT, malware, one of the most prevalent and pervasive initial threat vectors, continues to evolve and become more sophisticated. Using malware as a foothold, threat actors infiltrate targeted infrastructures and then move laterally to…
-
"Dell Credentials Bug Opens VMWare Environments to Takeover"Credentials hardcoded in the Dell Compellent storage array service could allow attackers to take control of enterprise VMware environments in organizations using both services. According to Enlyft, Dell Compellent reached its end of life in 2019. However…
-
"University of Michigan Researchers Create Screen Protection System to Fend Off Shoulder Surfers"Eye-Shield is an innovative screen protection system developed by researchers at the University of Michigan that obscures images and text on a user's phone and other devices when seen from a distance. According to the researchers, previous methods have…
-
"Researchers Put LLMs to the Test in Phishing Email Experiment"A team of security researchers tested the performance of Large Language Models (LLMs) in composing convincing phishing emails and detecting them. The results showed that Artificial Intelligence (AI) technology could generate highly effective phishing…
-
"New York Introduces First-Ever Statewide Cybersecurity Strategy"Governor Kathy Hochul has recently introduced New York's first-ever statewide cybersecurity strategy, reinforced by a $600m commitment. The initiative is designed to shield critical infrastructure, data, networks, and technology systems from…
-
"The New Technology That Is Making Cars Easier for Criminals to Steal, or Crash"The automotive industry is abuzz with the "Internet of Vehicles" (IoV) discussion. This describes a network of cars and other vehicles that can exchange data over the Internet to make transportation more autonomous, safe, and efficient. The IoV could…
-
"Interpol Shuts Down African Cybercrime Group, Seizes $2 Million"A recent cross-border investigation into West African cybercriminal groups has resulted in 103 arrests and the seizure of more than $2.2 million. Operation Jackal was led by law enforcement agencies across 21 countries on six continents and…
-
"Researchers Watched 100 Hours of Hackers Hacking Honeypot Computers"Two security researchers deployed several Windows servers that were deliberately exposed to the Internet. They were set up with Remote Desktop Protocol (RDP), allowing hackers to remotely control the compromised servers as if they were regular users.…