-
"Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen"Mispadu, a banking Trojan, has been linked to several spam campaigns aimed at Bolivia, Chile, Mexico, Peru, and Portugal with the goal of stealing credentials and distributing other payloads. The activity, which began in August 2022, is ongoing,…
-
"How to Protect Online Privacy in the Age of Pixel Trackers"Tracking pixels, such as the Meta and TikTok pixels, are widely used by online businesses to track the preferences and behaviors of website visitors, but they are not without risk. Although pixel technology has existed for years, privacy regulations such…
-
"Emotet Malware Now Distributed in Microsoft OneNote Files to Evade Defenses"The Emotet malware is now being delivered through Microsoft OneNote email attachments in an attempt to circumvent Microsoft's security measures and infect more systems. Emotet is a malware botnet that was previously spread using Microsoft Word and Excel…
-
"Meta Proposes Revamped Approach to Online Kill Chain Frameworks"Meta researchers Ben Nimmo and Eric Hutchins have proposed a new framework approach for addressing online threats, which uses a shared model for identifying, describing, comparing, and disrupting the different phases of an attack chain. Their new "Online…
-
"ChatGPT Could Make Phishing More Sophisticated"As the new version of the Artificial Intelligence (AI)-driven chatbot tool ChatGPT recently rolled out, experts have reiterated their greatest cybersecurity concern, which is that the technology will be used to compose more sophisticated phishing emails…
-
"Threat Actors Turn To QR Codes and Other Creative Techniques as Macros Are Blocked"According to new research from HP Wolf Security, the blocking of macros by default in Microsoft Office has prompted threat actors to be more creative with their attacks. As a result, there have been increases in the delivery of malware via PDFs and ZIP…
-
"Connected Vehicles and Cybersecurity--A New Frontier of Risk"Connected and Automated Vehicles (CAVs) could change how people view transportation and mobility. CAVs may provide numerous advantages, including enhanced service accessibility, reduced travel burdens, and safer transportation systems. Many of these…
-
"Streamlining Microelectronics Security and Testing"The Joint University Microelectronics Program (JUMP 2.0) was established by the Semiconductor Research Corporation (SRC) in response to the rapid evolution of the semiconductor industry. The coalition is composed of universities, industry partners, and…
-
"SpikeGPT: Researcher Releases Code for Largest-Ever Spiking Neural Network for Language Generation"Language generators such as ChatGPT are growing more popular for their ability to transform how humans engage with Artificial Intelligence (AI) and search engines. However, these algorithms are computationally expensive to run and rely on maintenance…
-
"Nation-State Hackers Using Malicious USB Drives in Attacks in Africa, Asia and Oceania"Hackers are using USB drives containing a strain of malware typically used by the Chinese government to target people in Mongolia, Papua New Guinea, Ghana, Zimbabwe, and Nigeria. Sophos researchers discovered the targeting of government organizations in…
-
"Under the Promise of Early Success, CISA Expands its Beta Mobile App Vetting Service"Mobile devices are essential to day-to-day operations, and their increasing use in government provides more than convenience. However, this connectivity has also widened the threat landscape, leaving the government vulnerable to malicious apps that could…
-
"US Government Warns Organizations of LockBit 3.0 Ransomware Attacks"The Federal Bureau of Investigation (FBI), the Cybersecurity and Information Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) recently issued an alert on the LockBit 3.0 ransomware operation. Since…
News