News
  • "Hackers Inject Credit Card Stealers into Payment Processing Modules"
    By hiding malicious code within the 'Authorize.net' payment gateway module for WooCommerce, a new hacking campaign designed to steal credit card information is able to evade detection by security scans. Traditionally, when threat actors breached e-…
  • "Chinese Warships Suspected of Signal-Jamming Passenger Jets"
    Australia's Qantas Airways warns pilots about signal interference on VHF communications channels from "stations purporting to represent the Chinese military" on flights over the western Pacific Ocean and South China Sea. The Australian airline also…
  • "Nexus: A New Rising Android Banking Trojan Targeting 450 Financial Apps"
    Threat actors have already launched the Android banking Trojan called Nexus to target 450 financial apps and commit fraud. According to the cybersecurity company Clearfy, Nexus is in its early stages of development. Nexus includes all the basic…
  • "Popular Fertility Apps Are Engaging in Widespread Misuse of Data"
    Katharine Kemp, senior lecturer in the Faculty of Law and Justice at the University of New South Wales (UNSW Sydney), conducted a new study that reveals major privacy flaws in fertility apps used by Australian consumers, highlighting the need for reform…
  • "What Do You Do if a Hacker Takes over Your Ship?"
    A joint team recently conducted a new cybersecurity course at the Norwegian University of Science and Technology (NTNU) in Ålesund. NTNU's program for the maritime industry has offered a new course called "Maritime digital security." Participants…
  • "CISA: Election Security Still under Threat at Cyber and Physical Level"
    Threats posed by foreign and domestic actors will continue to be a concern ahead of the 2024 presidential election, prompting federal cyber leadership to emphasize the need to bolster election security at both the local and national levels. During a…
  • "Report: Wartime Hacktivism Is Spilling over into the Financial Services Industry"
    According to a new report by the Financial Services Information Sharing and Analysis Center (FS-ISAC), Russia's war with Ukraine caused a rise in politically motivated hacktivism that continues to this day, significantly impacting the cyber threat…
  • "High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian"
    Security researchers at Cisco's Talos threat intelligence and research unit recently disclosed the details of two high-severity vulnerabilities discovered last year in WellinTech's KingHistorian industrial data historian software.  China-based…
  • "Securing Edge-Enabled Cyber-Physical Systems"
    Through edge computing, computation and data storage are brought closer together, reducing the amount of data sent to and from the cloud. Although edge computing reduces some security risks by keeping data near its source, it also adds new security…
  • "The Move to Memory-Safe Programming"
    In November 2022, the National Security Agency (NSA) suggested using memory-safe programming languages to protect against software-memory safety problems. The "Future of Memory Safety" report published earlier this year by Consumer Reports advocated…
  • "Just 1% of Dot-Org Domains Are Fully DMARC Protected"
    According to security researchers at EasyDMARC, only 1.2% of nearly 10 million .org domains in circulation have fully implemented DMARC to mitigate the risk of phishing.  The researchers reviewed over 9.9 million verified .org email domains and…
  • "Zoom Paid Out $3.9 Million in Bug Bounties in 2022"
    Video communications giant Zoom recently announced that in 2022 it paid out $3.9 million to security researchers who reported vulnerabilities as part of its bug bounty program.  Zoom launched a private bug bounty program on HackerOne in 2019 and has…