News
  • "California Hit By Cyberattack, LockBit Claims Responsibility"
    California's Cybersecurity Integration Center (Cal-CSIC) recently confirmed that California's finance department had recently been hit by a cyberattack.  Upon identification of the threat, digital security and online threat-hunting experts were…
  • "What Dangerous Security Vulnerabilities Can Access Control Systems Have?"
    Many access control systems that use facial recognition technology are insecure. They can be breached, deceived, and shown a person's photo on the phone screen rather than their actual face. A typical access control system consists of a device in a metal…
  • "'Crisis Situation' Declared as Two Swedish Municipalities Hit by Cyberattack"
    Following a cyberattack, the Swedish municipalities of Borgholm and Mörbylnga have declared a "crisis situation." An intrusion into the joint Information Technology (IT) system used by the two municipalities, which comprise the island of Öland with a…
  • "Fortinet Urges Customers to Fix Actively Exploited FortiOS SSL-VPN Bug"
    Fortinet has patched an actively exploited FortiOS SSL-VPN flaw, which could allow a remote, unauthenticated attacker to execute arbitrary code on devices. Fortinet strongly advises customers to update their installations in order to address the FortiOS…
  • "December Headline: Python, C and C++ Competing For Language of The Year Award"
    According to the TIOBE Index, which promises to check more than one billion lines of code every day in an effort to keep on top of usage, noted that Python remains the most popular coding language, affording a 16.66% rating, just a touch ahead of C in…
  • "24% of Technology Applications Contain High-Risk Security Flaws"
    During a new study, security researchers at Veracode found that with more applications to contend with than other industries, tech firms would benefit from implementing improved secure coding training and practices for their development teams.   The…
  • Book Announcement: International Relations in the Cyber Age: The Co-Evolution Dilemma
    A foundational analysis of the co-evolution of the internet and international relations, examining resultant challenges for individuals, organizations, firms, and states.
  • "As Wiretap Claims Rattle Government, Greece Bans Spyware"
    Lawmakers in Greece recently approved legislation banning commercial spyware and reforming rules for legally-sanctioned wiretaps following allegations that senior government officials and journalists had been targeted by shadowy surveillance software.…
  • "Uber Suffers Data Breach After Attack on Third-Party Vendor"
    A threat actor named "UberLeaks" published employee email addresses, Information Technology (IT) asset information, and corporate reports online, resulting in a new data breach for Uber. The stolen Uber and Uber Eats data was published on a hacking forum…
  • "Security Overlooked in Rush to Hybrid Working"
    Security researchers at Apogee have discovered that security is a priority for less than a fifth (14%) of organizations looking to transition fully to a hybrid or remote workforce, leaving many exposed to cyber risk.  The researchers polled 100 SME…
  • "Aussie Data Breaches Surge 489% in Q4 2022"
    Security researchers at Surfshark have found that Australia had the highest “data breach density” in the world as of the fourth quarter.  On average, 7387 user accounts were leaked per 100,000 Australians during the first two months of this quarter…
  • "Metaparasites & the Dark Web: Scammers Turn on Their Own"
    Cybercriminals are typically considered parasites that feed on various victims, but they have become targets themselves as there are "metaparasites" going to dark web marketplaces to find their own set of targets. Metaparasites present the unintended…