News
-
"False Claims Attacks on Infrastructure Focus of NSF-Funded Research"False claims and disinformation in a society highly influenced by social media have become significant problems with potentially severe consequences. Researchers at the University of Oklahoma and collaborating institutions have received funding from the…
-
"Apple Users Open to Remote Control via Tricky macOS Malware"Researchers at Guardz have discovered Hidden Virtual Network Computing (hVNC) malware that infests Macs and silently executes complete takeovers without user permission. It also sports persistence through reboots. It's being sold at a…
-
"Collide+Power Vulnerability Leaks Secrets Bit by Bit"Researchers in Austria and Germany have developed a power-monitoring side-channel attack that exposes sensitive data on modern computer chips. The Collide+Power attack analyzes the processor's power consumption to determine the contents of the CPU cache…
-
"Researchers Claim US-Registered Cloud Host Facilitated State-Backed Cyberattacks"According to researchers at the cybersecurity company Halcyon, the US-registered cloud company Cloudzy provided web hosting and Internet services to over two dozen state-sponsored hacking groups and commercial spyware operators. In a recently published…
-
"Experts Discovered a Previously Undocumented Initial Access Vector Used by P2PInfect Worm"Cado Security has discovered a new variant of the peer-to-peer (P2P) worm known as the P2PInfect, which targets Redis servers with a previously undocumented initial access vector. In July, researchers at Palo Alto Networks Unit 42 found the new P2P worm…
-
"Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report"The Biden administration recently announced that it believes China has implanted malware in key US power and communications networks in a "ticking time bomb" that could disrupt the military in the event of a conflict. The Times reported that the…
-
"Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack"Bedding products giant Tempur Sealy has recently shut down certain systems after falling victim to a cyberattack. Based in Lexington, Kentucky, Tempur Sealy manufactures and sells mattresses, pillows, and other bedding products under brands such as…
-
"Researchers Unveil New Cipher System that Protects Computers Against Spy Programs"With the development of a new, highly efficient cipher for cache randomization, a group of international researchers has made significant progress in computer security. The cipher, designed by Rei Ueno, an assistant professor from the Research Institute…
-
"Stremio Vulnerability Exposes Millions to Attack"Researchers at CyFox have discovered a Dynamic Link Library (DLL) planting/hijacking vulnerability in the popular media center application Stremio, which attackers could exploit to execute code on a victim's system, steal information, and more. DLLs are…
-
"Canon Warns of Wi-Fi Security Risks When Discarding Inkjet Printers"Canon is warning users of home, office, and large-format inkjet printers that the Wi-Fi connection settings stored in the devices' memories are not wiped during initialization, enabling access to the data for others. This vulnerability could pose a…
-
"China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe"A nation-state actor with ties to China is believed to have been behind a series of attacks against industrial organizations in Eastern Europe that occurred last year in an attempt to steal data from air-gapped systems. Researchers attributed the attacks…
-
"China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure"The US military has been dealing with two significant cyber threats, one being the Chinese campaign called Volt Typhoon against military bases, and the other being an insider breach impacting Air Force and FBI communications. The Biden administration has…