News
  • "CISA, NSA Provide OT, ICS Defense Strategies to Critical Infrastructure"
    According to a joint cybersecurity advisory issued by the National Security Agency (NSA) and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), Operational Technology (OT) and Industrial Control System (ICS)…
  • "Multi-Platform Chaos Malware Threatens to Live up to Its Name"
    Security researchers at Lumen's Black Lotus Labs have found that Chaos, the new multipurpose malware written in the Go programming language, is spreading across the world.  The researchers stated that the malware has quadrupled in size in just two…
  • "Hacker Breaches Fast Company Apple News Account, Sends Racist Messages"
    A hacker recently breached Fast Company's Apple News account and sent obscene push notifications to users' home screens.  US business publication Fast Company confirmed the hack saying a threat actor breached the company's content management system…
  • "INKY Finds New Phishing Attack Technique Spoofing Netflix"
    According to a report recently published by INKY Technology, a provider of an email security platform, cybercriminals have discovered another way to harvest credentials by impersonating the web pages of Netflix. INKY found malicious HTML attachments…
  • "Browser-Based Heat Attacks Putting CISOs on the Hot Seat"
    As employee adoption of Software-as-a-Service (SaaS) applications and other cloud-based services grows, the web browser has become a popular entry point for attackers looking to stealthily breach an endpoint before moving into the network. Highly Evasive…
  • "L2 Network Security Control Bypass Flaws Impact Multiple Cisco Products"
    Cisco recently confirmed that tens of its enterprise routers and switches are impacted by bypass vulnerabilities in the Layer-2 (L2) network security controls.  Cisco noted that an attacker can bypass the controls provided by these enterprise…
  • "New Deepfake Threats Loom, Says Microsoft's Chief Science Officer"
    Eric Horvitz, Microsoft's chief science officer, testified before the US Senate Armed Services Committee Subcommittee on Cybersecurity, stating that organizations will face new challenges as cyberattacks become more sophisticated, including through using…
  • "Chrome 106 Patches High-Severity Vulnerabilities"
    Google recently announced the release of Chrome 106 to the stable channel with patches for 20 vulnerabilities, including 16 reported by external researchers.  Of the externally reported security bugs, five are rated "high" severity, eight are "…
  • "Cyber Threats Top Business Leaders' Biggest Concerns"
    According to insurance provider Travelers, cyber threats are the number one concern for US business decision makers, beating worries over economic uncertainty, rising energy costs, and hiring.  The firm polled over 1200 US business leaders.  It…
  • "Most Attackers Need Less Than 10 Hours to Find Weaknesses"
    The average ethical hacker can discover a vulnerability that allows a network perimeter breach and the exploitation of the environment in less than 10 hours, with penetration testers focused on cloud security gaining access to targeted assets the fastest…
  • "WatchGuard Finds Malware Volume Decreased in Q2, but Warns Emotet Is Resurging"
    WatchGuard Threat Lab's Q2 Internet Security Report shows that overall malware detections have decreased since their peak in the first half of 2021, despite an ongoing Emotet botnet resurgence. Microsoft Office exploits continue to spread more than any…
  • "Leaked LockBit 3.0 Builder Used by 'Bl00dy' Ransomware Gang in Attacks"
    The new Bl00dy ransomware gang is now using the recently leaked LockBit ransomware builder in its attacks targeting companies. The LockBit 3.0 ransomware builder was recently leaked on Twitter after the LockBit operator had a disagreement with his…