News
  • "Play Ransomware Lists A10 Networks on Its Leak Site"
    According to BetterCyber, the Play ransomware group placed the San Jose, California-based networking hardware manufacturer A10 Networks on its leak site after accessing the company's Information Technology (IT) infrastructure. BetterCyber revealed that…
  • "Reddit Hack Shows Limits of MFA, Strengths of Security Training"
    The recent Reddit hack demonstrates that attackers are continuing to find new ways to circumvent multi-factor authentication (MFA) solutions. Reddit notified its users on January 9 that a threat actor had successfully tricked an employee into clicking on…
  • "Israel's Technion University Targeted With Ransomware"
    Technion University, the top technology school in Israel, was impacted by a previously unknown ransomware group called DarkBit. To recover stolen data, the attackers are demanding 80 bitcoins (nearly $1.7 million) from the university. A ransom note…
  • "DHL, MetaMask Phishing Emails Target Namecheap Customers"
    Namecheap customers' inboxes have recently been hit with phishing emails mimicking DHL and MetaMask, seeking to trick recipients into divulging personal information or their cryptocurrency wallet's secret recovery phrase. The emails appear to have been…
  • "Devs Targeted by W4SP Stealer Malware in Malicious PyPI Packages"
    Security researchers at Fortinet discovered five malicious packages on the Python Package Index (PyPI), stealing developers' passwords, Discord authentication cookies, and cryptocurrency wallets. PyPI is a software repository for Python-created packages…
  • "Enigma, Vector, and TgToxic: The New Threats to Cryptocurrency Users"
    Russian threat actors have been targeting Eastern European users in the cryptocurrency industry with fake job postings, tricking them into installing information-stealing malware. The attackers use various highly obfuscated and under-development custom…
  • "New UMD Center to Focus on Railway Cybersecurity and Safety"
    US railways have undergone significant digital transformations, with distributed computer systems now handling many parts of their operations, potentially leaving them exposed to cyberattacks and other forms of sabotage. A malicious actor could…
  • "Cybercriminals Bypass OpenAI's Restrictions on Malicious Use"
    Cybercriminals have discovered a way to bypass OpenAI's restrictions against using its natural language Artificial Intelligence (AI) model for malicious purposes, according to researchers who have spotted low-level hackers using the company's ChatGPT…
  • "Research Team at Georgia State University Is Identifying How Scammers Target Victims on Dating Apps"
    A team of researchers at Georgia State University conducted research that reveals the strategies used by scammers to earn people's trust and render them vulnerable to cybercrime. The issue known as "romance fraud" is often underreported and understudied…
  • "Privacy Skills Gap Is the Top Obstacle for Privacy Programs, Underfunded Budgets a Major Obstacle To Attracting Privacy Professionals"
    The Information Systems Audit and Control Association (ISACA) conducted a survey in the fourth quarter of 2022 to which about 1,890 working individuals with one of the organization's cybersecurity or privacy solutions certifications responded. The survey…
  • "VMware Ransomware Evolves to Evade Data Recovery, Reinfects Servers"
    According to data compiled by Ransomwhere, an open-source ransomware payment tracker, a new variant of ESXiArgs ransomware has infected over 1,250 VMware systems. Since the spread began on February 3, the original strain has affected at least 3,800…
  • "Valve Waited 15 Months to Patch High-Severity Flaw. A Hacker Pounced"
    Researchers have discovered four game modes that could exploit a vulnerability in the popular Dota 2 video game. The vulnerability remained unpatched for 15 months after a fix was released. It existed in Google's V8 open-source JavaScript engine, which…