News
  • "CISA: Patch Bug Exploited by Chinese E-commerce App"
    The US Cybersecurity and Infrastructure Security Agency (CISA) recently added CVE-2023-20963 to its Known Exploited Vulnerabilities Catalog.  CISA has given the government until May 4 to patch the zero-day vulnerability, which was allegedly…
  • "LockBit Ransomware Is Targeting Macs for the First Time"
    LockBit, one of the most notorious ransomware strains, reportedly infected Apple Mac devices for the first time. MalwareHunterTeam cybersecurity researchers reported discovering "locker_Apple_M1_64," which is said to be the first LockBit ransomware…
  • "Genius Hackers Help Russia's Neighbors Thwart Cyber Incursions"
    Russia's cyber capabilities are not to be underestimated, but NATO neighbors are more than capable of defending themselves against the Kremlin, according to the Lithuanian cyber chief. Constant cyberattacks from Russia are launched against the nations…
  • "Payments Giant NCR Hit by Ransomware"
    US payments giant NCR recently confirmed that a recent data center outage resulted from a ransomware attack.  A well-known ransomware group has taken credit for the attack.  NCR first reported investigating an “issue” related to its Aloha…
  • "Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites"
    A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver Google Command and Control (GC2), an open-source red teaming tool, as part of a broader exploitation of Google's infrastructure for malicious purposes. Google's…
  • "New Chameleon Android Malware Mimics Bank, Govt, and Crypto Apps"
    Since the start of the year, a new Android Trojan called Chameleon has been targeting users in Australia and Poland by imitating the CoinSpot cryptocurrency exchange, an Australian government agency, and the IKO bank. The cybersecurity company Cyble…
  • "Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"
    Extended Internet of Things devices (xIoT) are attractive to cyberattackers aiming to move laterally within enterprise networks and establish persistence. Such devices have everything the bad guys need to gain a foothold as xIoT devices are significantly…
  • "AI Tools Like ChatGPT Expected to Fuel BEC Attacks"
    Armorblox reports that 57 percent of all Business Email Compromise (BEC) attacks observed in the past year used language as the primary attack vector to reach unsuspecting employees. In addition, vendor compromise and fraud are increasing as a new attack…
  • "ODU Researchers Receive Grants to Address Maritime Cybersecurity Needs"
    The Coastal Virginia Center for Cybersecurity Innovation (COVA CCI), the Commonwealth Cyber Initiative (CCI) node for southeastern Virginia, has awarded $581,100 to seven maritime industry-focused cybersecurity research projects. Old Dominion University…
  • "The Quantum Security Era Is Coming – Here's How Leaders Can Prepare for It"
    Quantum computers promise transformative power for certain types of complex computational problems, such as advanced statical modeling in the financial sector, accelerated research and development for pharmaceutical companies, and a more efficient supply…
  • "What Are Passkeys? A Cybersecurity Researcher Explains How You Can Use Your Phone to Make Passwords a Thing of the Past"
    Passwords may soon become obsolete. However, the need for authentication and secure website access remains as strong as ever. Passkeys are digital credentials that are stored on a user's mobile device or computer. They are similar to actual keys. Access…
  • "LVHN: Sensitive Photos of Almost 2,800 Patients Potentially Stolen in Data Breach"
    Lehigh Valley Health Network (LVHN) has recently revealed that cybercriminals potentially stole sensitive photographs of as many as 2,760 patients during a data breach.  LVHN announced in February that a cyberattack carried out by the Russian…