News
-
"NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness"A former GitHub employee claims that a vulnerability in Node Package Manager (npm) could enable anyone to hide malicious dependencies and scripts within their packages. Npm, owned by GitHub, is used for sharing JavaScript code among over 17 million…
-
"CyberCamp Introduces Students to Cybersecurity"The Center for Cyber Law, Policy, and Security (Pitt Cyber), together with Pitt Information Technology (Pitt IT), recently held the sixth annual Air Force Associate (AFA) CyberCamp. The EQT Foundation and Grable Foundation, along with the Pitt Community…
-
"Making 911 Calls More Secure"The National Science Foundation (NSF) has awarded a $1.2 million grant to a team of researchers from Purdue University and Michigan State University to continue enhancing the security of cellular 911 calls. In the US, the Federal Communications…
-
"To Pay or Not to Pay? Ransomware Attacks Are the New Kidnapping"In recent years, ransomware attacks have evolved into a persistent security risk. The inability to effectively respond to this challenge has normalized what should be intolerable: organized cybercriminals harbored by hostile states disrupting and…
-
"CISA Releases Cloud Services Guidance and Resources"The Cybersecurity and Infrastructure Security Agency (CISA) has released the first series of final security guidance resources under its Secure Cloud Business Applications (SCuBA) project: the Extensible Visibility Reference Framework (eVRF) Guidebook…
-
"NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments"Cybercriminals frequently target software development and delivery supply chains. These environments can be used to compromise cloud deployments throughout the automated software development and delivery lifecycle. The National Security Agency (NSA) and…
-
"A Bridge Between Different Cryptocurrencies"Bitcoin is the most well-known cryptocurrency in the world today, but there are numerous others, each implementing a different set of technical features. To exchange one cryptocurrency for another, so-called "bridges" are used, which are typically…
-
"ChatGPT Users at Risk for Credential Theft"New research conducted by Group-IB reveals that threat actors are increasingly compromising ChatGPT accounts. They may use this access to collect sensitive data and launch additional targeted attacks. According to Group-IB, ChatGPT credentials have…
-
"Wagner Ransomware Wants to Recruit Its Victims"Wagner ransomware infects user devices and invites them to join the Wagner Group, which is a Russian Private Military Corporation (PMC). Cyble researchers say that the recently detected ransomware likely targets Russians. Instead of demanding payment,…
-
"ThirdEye Infostealer Poses New Threat to Windows Users"Security researchers at FortiGuard Labs discovered a new infostealer called ThirdEye that is potentially targeting Windows users. The researchers stated that ThirdEye is designed to extract valuable system information from compromised…
-
"Critical SQL Injection Flaws in Gentoo Soko Can Lead To Remote Code Execution"Researchers at SonarSource discovered two SQL injection vulnerabilities in Gentoo Soko, tracked collectively as CVE-2023-28424 with a CVSS score of 9.1, which a remote attacker can exploit to execute arbitrary code on vulnerable systems. Soko is deployed…
-
"Mobile Malware and Phishing Surge in 2022"According to security researchers at Zimperium, the volume of mobile malware, phishing sites dedicated to mobiles, and mobile vulnerabilities increased significantly in 2022. The researchers found that the percentage of phishing sites targeting…