News
-
"A New Technique Enables AI Models to Continually Learn From New Data on Intelligent Edge Devices Like Smartphones and Sensors, Reducing Energy Costs and Privacy Risks"Microcontrollers, which are small computers that can execute simple commands, are the foundation for billions of connected devices, ranging from Internet of Things (IoT) devices to automotive sensors. However, because low-power microcontrollers have…
-
"Ferrari Says Internal Documents Online, But no Evidence of Cyberattack"Recently Ferrari found that some internal documents had been posted online, and the luxury sports carmaker is currently working to identify how this had happened. Ferrari added it had no evidence of a breach of its systems or ransomware and said…
-
"As Ransomware Attacks Increase, New Algorithm May Help Prevent Power Blackouts"Millions of people could lose power if a ransomware attack only slightly altered energy flow onto the US power grid. There is no single power utility company that has enough resources to protect the entire grid, but if there was a map showing where to…
-
"Malicious Tor Browser Installers Spread Via Darknet Video on YouTube"Cybersecurity researchers at Kasperksky have recently identified multiple infections via malicious Tor Browser installers spread via an explanatory video about the Darknet on YouTube. The YouTube channel in question has more than 180,000…
-
"Dell to Open Zero-Trust Center of Excellence"Dell Technologies has announced that, in collaboration with CyberPoint International and the Maryland Innovation Security Institute (MISI), it will open a zero-trust Center of Excellence at the US Cyber Command's DreamPort facility in Columbia, Maryland…
-
"Social Media Account Hijacking Jumps 1,000% in Last 12 Months"According to the Identity Theft Resource Center (ITRC), social media account hijacking has grown significantly within the last 12 months. Its 2022 Consumer Impact Report revealed that social media takeovers increased by 1,000 percent during the period.…
-
"Critical Vulnerabilities Expose Parking Management System to Hacker Attacks"Nearly a dozen vulnerabilities have recently been found in a car parking management system made by Italian company Carlo Gavazzi, which makes electronic control components for building and industrial automation. The flaws were discovered by…
-
"Bug Exploitation Now Top Ransomware Access Vector"Security researchers at Secureworks found that vulnerability exploitation accounted for 52% of ransomware incidents over the past 12 months, making it the number one initial access vector for threat actors. The researchers stated that exploitation…
-
"Collective Defense — Integrated Cyber Expertise Hardens Cybersecurity"Every October, the National Cybersecurity Alliance (NCSA) and the Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) join industry and government to raise awareness about cybersecurity and best practices for all…
-
"Researchers Outline the Lazarus APT Offensive Toolset"Researchers at ESET discovered and examined a set of malicious tools used by the Lazarus Advanced Persistent Threat (APT) group in attacks at the end of 2021. The campaign began with spear phishing emails containing malicious Amazon-themed documents,…
-
"Bumblebee Malware Loader's Payloads Significantly Vary by Victim System"Bumblebee is a dangerous malware loader that first appeared in March. A new analysis of the malware loader reveals that its payload for systems connected to an enterprise network differs significantly from its payload for standalone systems. The malware…
-
"Fake Microsoft Exchange ProxyNotShell exploits for sale on GitHub"Scammers are posing as security researchers and selling fake proof-of-concept (POC) ProxyNotShell exploits for newly discovered Microsoft Exchange zero-day vulnerabilities. The cybersecurity firm GTSC disclosed that two new zero-day vulnerabilities in…