News
  • "Using Quantum Physics to Secure Wireless Devices"
    The security of communication between wireless devices, such as access cards, key fobs, Bluetooth speakers, and more, is essential to maintaining privacy and preventing theft. However, these tools are not foolproof, and it is becoming easier to find…
  • "Microsoft Blames Clop Affiliate for PaperCut Attacks"
    Microsoft has recently claimed that recent attacks exploiting two vulnerabilities in the PaperCut print management software are likely the result of a Clop ransomware affiliate.  The two bugs in question are CVE-2023–27350, a critical…
  • "RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi Hosts"
    The threat actors behind RTM Locker have a new ransomware strain capable of infecting Linux systems. Uptycs stated in a new report that the locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by the leaked source code of the…
  • "CISOs Struggle to Manage Risk Due to DevSecOps Inefficiencies"
    According to Dynatrace, as hybrid and multi-cloud environments become more complex and teams continue to rely on manual processes that make it easier for vulnerabilities to enter production environments, it becomes more difficult for CISOs to keep…
  • "Tencent QQ Users Hacked in Mysterious Malware Attack, Says ESET"
    The Chinese Advanced Persistent Threat (APT) hacking group known as Evasive Panda is linked to an attack that distributed the MsgBot malware as part of an automatic update for the Tencent QQ messaging app. Since 2012, the cyberespionage group Evasive…
  • "Metaverse Version of the Dark Web Could Be Nearly Impenetrable"
    In the coming years, as the metaverse takes shape, many security issues plaguing cyberspace will also begin to affect virtual space. One of the threats will be the emergence of a new "darkverse," where criminals will be able to operate with greater…
  • "8 Areas of Future Research in Zero Trust"
    In the National Cybersecurity Strategy published on March 1, 2023, the Biden administration committed to improving federal cybersecurity by implementing a Zero Trust Architecture (ZTA) strategy as well as modernizing Information Technology (IT) and…
  • "Used Routers Often Come Loaded With Corporate Secrets"
    Researchers from the security company ESET discovered that over half of the secondhand enterprise routers they purchased for testing were overflowing with network information, credentials, and sensitive data about the institutions that previously owned…
  • "Irrigation Systems in Israel Hit With Cyber Attack That Temporarily Disabled Farm Equipment"
    The cyberattack that targeted irrigation systems in Israel is suspected to be part of an annual "hacktivist" campaign. The hackers targeted farms and water treatment facilities. A dozen farms failed to heed a warning from the National Cyber Directorate…
  • "As Cyber Attacks Surge, the Defense Department Turns to Universities for Cybersecurity Grads"
    As cyberattacks make the US, its businesses, and its citizens more vulnerable to data breaches, ransomware, and IP theft, the country's demand for cybersecurity professionals exceeds its talent pool. In 2022, the US cybersecurity workforce grew by five…
  • "MITRE Debuts Cyber Risk Analysis & Adversarial Emulation Tools to Secure Critical Infrastructure"
    Critical infrastructure is riddled with cyber vulnerabilities, but the issue is which vulnerabilities must be mitigated first. MITRE is debuting its Infrastructure Susceptibility Analysis (ISA) that identifies and prioritizes mitigations by exploring how…
  • "A Security Team Is Turning This Malware Gang's Tricks Against It"
    The attacks and operations of specific cybercriminal groups, such as ransomware gangs, botnet operators, and financial fraudsters, receive special attention. However, the larger ecosystem behind digital crime has various malicious actors and…