News
  • "Telegram Now the Go-to Place for Selling Phishing Tools and Services"
    Telegram has become a hub for phishing bot and kit developers seeking to advertise their products to a larger audience or recruit helpers. Although the messaging platform has been used for cybercriminal activities for years, threat actors in the phishing…
  • "'BEC 3.0' Is Here With Tax-Season QuickBooks Cyberattacks"
    Cybercriminals are targeting victims with well-crafted phishing attacks from QuickBooks online accounts to steal credentials. According to researchers from Avanan, the scheme is at a level of legitimacy and social engineering that suggests new Business…
  • "Rilide Browser Extension Steals MFA Codes"
    Cryptocurrency thieves are targeting users of Chromium-based browsers, including Google Chrome, Microsoft Edge, Brave Browser, and Opera, with an extension that can steal credentials and multi-factor authentication (MFA) codes. The extension, dubbed…
  • "CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products"
    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released eight advisories regarding critical vulnerabilities in Industrial Control Systems (ICS) products from Hitachi Energy, mySCADA Technologies,…
  • "Researchers Fight Cybercrime With New Digital Forensic Tools and Techniques"
    Irfan Ahmed, Ph.D., associate professor of computer science, equips the good guys fighting the never-ending cybersecurity conflict with digital forensic tools and the knowledge to use them. Ahmed is the director of the Security and Forensics Engineering…
  • "Security Made Simple With NCSA's CILogon"
    Almost everyone in the digital age has likely, at some point, needed to access cloud-stored documents and data but forgot their password and had to create a new identity. For researchers with allocations for high-performance computing and services across…
  • "Hackers Using Log4j Bug to Profit From Victim IP Addresses Through 'Proxyjacking' Scheme"
    Dozens of companies charge customers to use a different Internet Protocol (IP) address for activities such as watching YouTube videos unavailable in their region, conducting unrestricted web scraping and browsing, or visiting websites without attributing…
  • "Growing Challenges For Increasingly Connected Vehicles"
    As cars become more connected, they will face more security challenges. Connectivity involves all vehicle components, encompassing everything from autonomous driving to connected infotainment and in-cabin monitoring. In addition, it includes external…
  • "Organizations Struggle to Manage OT Security Risks"
    According to a new survey conducted by OTORIO and ServiceNow, 58 percent of organizations consider their Operational Technology (OT) cybersecurity risk as high or critical. However, according to the survey of 200 Information Technology (IT) and OT…
  • "Uber Drivers' Data Exposed in Breach of Law Firm's Servers"
    A mid-sized law firm representing Uber has recently notified an unknown number of its drivers that sensitive data has been exposed and stolen due to a cyberattack.  New Jersey-based Genova Burns disclosed the breach in an email to customers.  …
  • "New Cyber Software Can Verify How Much Knowledge AI Really Knows"
    As a result of the developing global interest in generative Artificial Intelligence (AI) systems, University of Surrey researchers have developed software that can verify how much information an AI gathered from an organization's digital database. As…
  • "Simulating a Secure Future"
    According to Rajat Kumar, a Ph.D. student in Yehia Massoud's lab at King Abdullah University of Science and Technology (KAUST), it is not inconceivable for a malicious employee of a company that implants chips in about 50 percent of the world's computers…