News
-
"Russia-Based Hackers Building New Attack Infrastructure to Stay Ahead of Public Reporting"Due to increased public reporting by security researchers and technology companies such as Microsoft and Google, a Russia-based hacking group connected to previous attacks on governments is shifting tactics. According to a report from Recorded Future,…
-
"Threat of Cyber Attacks to National Security Compared to That of Chemical Weapons"According to the UK government's latest National Risk Register (NRR) report for 2023, the risk of cyberattacks is now considered to be more severe than that posed by small-scale chemical, biological, radiological, or nuclear (CBRN) attacks, such as the…
-
"Report Reveals 'Sudden Surge' in Cyberattacks Targeting Government Agencies"According to a new report, cyberattacks against government agencies and the public sector have increased alarmingly over the past few months, as threat actors deployed various novel malware campaigns targeting financial institutions, healthcare services…
-
"A Cyberattack Has Disrupted Hospitals and Health Care in Five States"A recent cyberattack has disrupted hospital computer systems in several states, forcing some emergency rooms to close and ambulances to be diverted, and many primary care services remained closed on Friday as security experts worked to determine the…
-
"CISA Cybersecurity Strategic Plan: Shifting the Arc of National Risk to Create a Safer Future"President Biden issued the National Cybersecurity Strategy in March, outlining a clear and imperative path for the US. As the nation's Cyber Defense Agency, the Cybersecurity and Infrastructure Security Agency (CISA) plays a pivotal role in advancing…
-
"New York Couple Plead Guilty to Bitcoin Laundering"A married couple from New York dubbed “Bitcoin Bonnie and Crypto Clyde” recently pleaded guilty to laundering billions of dollars in stolen bitcoin. Ilya Lichtenstein, 35, and Heather Morgan, 33, were arrested in February last year after the US…
-
"CPU Security Loophole: Analysis of Energy Consumption Allows Data Theft"Central Processing Units (CPUs) are designed to run multiple applications simultaneously, which is advantageous for productivity, but poses a security risk. By analyzing the processor's energy consumption, researchers at TU Graz and the Helmholtz Center…
-
"Credentials Account For Over Half of Cloud Compromises"Google recently discovered that over half (55%) of public cloud compromises in the first three months of the year were down to a missing or weak password. Google noted that the second most common compromise factor in the period was misconfiguration…
-
"U-M Researchers Play Role in Creating New California Privacy Choice Icon"California has enacted a new online privacy icon designed to give users greater authority over their personal information. Researchers from the University of Michigan's School of Information (UMSI) led the research to create the icon, simplifying…
-
"Malicious npm Packages Found Exfiltrating Sensitive Data from Developers"Researchers have found a new set of malicious packages on the npm package registry that are designed to steal sensitive developer information. On July 31, 2023, the software supply chain company Phylum discovered the "test" packages, which showed…
-
"Hacktivists Fund Their Operations Using Common Cybercrime Tactics"Hacktivist groups that operate for political or ideological reasons use various strategies to finance their operations. Although hacktivism appears to be about inflicting service disruption through Distributed Denial-of-Service (DDoS) attacks or…
-
"VPNs Remain a Risky Gamble for Remote Access"According to a new Zscaler report, organizations are concerned about network security because of the threats posed by Virtual Private Networks (VPNs). Due to the increased threat of cybercriminals exploiting VPN vulnerabilities, the report emphasizes the…