News
-
"Fake Linux Vulnerability Exploit Drops Data-Stealing Malware"A fake proof-of-concept (PoC) exploit that installs Linux password-stealing malware targets cybersecurity researchers and threat actors. The fake PoC claims to be an exploit for a critical use-after-free vulnerability, tracked as CVE-2023-35829,…
-
"New SOHO Router Botnet AVrecon Spreads to 70,000 Devices Across 20 Countries"A new strain of malware has been targeting small office/home office (SOHO) routers covertly for over two years, infiltrating more than 70,000 devices and creating a botnet with 40,000 nodes across 20 countries. The malware has been dubbed AVrecon by…
-
"Facebook and Microsoft Remain Prime Targets for Spoofing"According to Vade, although phishing trends often change, Facebook and Microsoft continue to dominate as the most spoofed brands. The collective dominance of Facebook and Microsoft as the most spoofed brands persisted into H1 2023, with Facebook…
-
"WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses"Cybercriminals are using generative Artificial Intelligence (AI) technology to help conduct activities and execute Business Email Compromise (BEC) attacks. WormGPT is a black-hat alternative to GPT models designed specifically for malicious activities.…
-
"Embry-Riddle Cybersecurity Student Earns Place on Boeing's Security Hall of Fame"Kestral Carlough, a Cyber Intelligence and Security student at Embry-Riddle Aeronautical University, was recently inducted into Boeing's Security Hall of Fame for finding and reporting a security flaw in a popular flight application. Carlough began a…
-
"Virginia Tech Researchers Maximize Data Security, Minimize Machine Interactions to Improve Patient Care"According to Sarah Parker, the chair of health systems and implementation science at Virginia Tech Carilion School of Medicine, physicians spend much of their days handling computer inputs. Parker emphasized that while medical professionals work to save…
-
"Huge Increase in USB Malware in First Half of 2023"Researchers at Mandiant have observed a threefold growth in USB malware attacks. In a blog post, Mandiant describes two espionage campaigns, the first of which involves malware called SOGU. The company identifies SOGU malware as one of the most prevalent…
-
"Cloud Poses Special Cyber Risks for Critical Infrastructure, Report Warns"According to recently published research, cloud computing technologies pose significant cybersecurity risks to federal agencies and other organizations that do not adapt their processes and workforce to the cloud paradigm. In its report, the Cyber…
-
"BlackLotus UEFI Bootkit Source Code Leaked on GitHub"The source code for the BlackLotus UEFI bootkit has recently been shared publicly on GitHub, albeit with several modifications compared to the original malware. The bootkit is designed specifically for Windows and emerged on hacker forums in…
-
"Juniper Networks Patches High-Severity Vulnerabilities in Junos OS"Networking appliances maker Juniper Networks recently announced software updates that patch multiple high-severity vulnerabilities in Junos OS, Junos OS Evolved, and Junos Space. The company published 17 advisories detailing roughly a dozen Junos…
-
"Popular WordPress Security Plugin Caught Logging Plaintext Passwords"The All-In-One Security (AIOS) WordPress plugin was recently found to be logging plaintext passwords from login attempts. Installed on over one million WordPress sites, the security and firewall plugin was designed to prevent cyberattacks such as…
-
"Google's Bard Poses Ransomware Risk, Say Researchers"Bard, Google's Artificial Intelligence (AI)-powered content generator, will readily compose phishing emails upon request and, under the right prompting, can generate basic ransomware code. Researchers at Check Point note that this places Bard behind its…