News
-
"Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining"As part of a new campaign designed to deliver the Mirai botnet malware and cryptocurrency miners, misconfigured and inadequately secured Apache Tomcat servers are being targeted. Over 800 attacks were detected against Aqua's Tomcat server honeypots over…
-
"Almost 40% Of Ubuntu Users Vulnerable to New Privilege Elevation Flaws"Two recently introduced Linux vulnerabilities in the Ubuntu kernel make it possible for unprivileged local users to acquire elevated privileges on a large number of devices. Ubuntu is one of the most popular Linux distributions, particularly in the US,…
-
"SEC Adopts New Cybersecurity Incident Disclosure Rules for Companies"The Securities and Exchange Commission (SEC) has adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to annually disclose material information regarding their cybersecurity risk management, strategy, and…
-
"'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads"Hackers are planting "malvertisements" for widely-used Information Technology (IT) tools on search engines in an attempt to lure IT professionals and conduct ransomware attacks in the future. The scheme involves pay-per-click advertisements on Google and…
-
"Google Announces Inaugural Cohort in Cybersecurity Initiative"Researchers at Cornell Tech and the Cornell Ann S. Bowers College of Computing and Information Science are part of the first cohort of participants from four institutions to receive funding from the Google Cyber New York City (NYC) Institutional Research…
-
"Researchers Uncover Fake Base Stations in Cellular Networks Using Machine Learning"Cellular networks are essential for various applications, including phone calls and Internet access. However, the growth of fake base stations in cellular networks, sometimes known as stingrays, cell-site simulators, or IMSI catchers, poses a major…
-
"A Defense Against Attacks on Unmanned Ground and Aerial Vehicles"A University of Texas at Arlington (UTA) engineering researcher is developing defenses to prevent cyberattacks targeting networks of self-driving cars and Unmanned Aerial Vehicles (UAVs). Animesh Chakravarthy, associate professor in the Department of…
-
"Hacktivism: Is It Fashionable Again or Just a Sly Cover?"Reports of "hacktivism" are rising, with 2022 seeing a significant resurgence in the area, primarily fueled by the Russia-Ukraine conflict. According to Radware data, from February 18 to April 18 this year, hacktivists claimed over 1,800 Distributed…
-
"Decoy Dog Malware Upgraded to Include New Features"Security researchers at Infoblox have released crucial updates on the “Decoy Dog” remote access trojan (RAT) toolkit in a new threat report published today. Decoy Dog was initially discovered and disclosed in April 2023. Decoy Dog has proven…
-
"Sneaky Python Package Security Fixes Help No One – Except Miscreants"According to computer security researchers, Python security fixes are often implemented through "silent" code commits without an associated Common Vulnerabilities and Exposures (CVE) identifier. That is not ideal, they argue, because attackers like…
-
"No, Criminals Are Not in Love With VPNs, Expert Insists"CrowdSec analyzed data on malicious Internet Protocol (IP) addresses and discovered that most malicious activity stems from Russia, the US, and India. Over one million IP addresses in each of these countries have been reported as malicious. However,…
-
"CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"According to a new report from the US Cybersecurity and Infrastructure Security Agency (CISA), more than half of all cyberattacks against government agencies, critical infrastructure organizations, and state-level government bodies involved legitimate…