News
  • "Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack"
    The popular end-to-end encrypted messaging service Signal revealed on that the cyberattack on Twilio earlier this month may have exposed the phone numbers of approximately 1,900 users. An attacker could have attempted to re-register their number to…
  • "Most Q2 Attacks Targeted Old Microsoft Vulnerabilities"
    Security researchers have revealed that attacks targeting a Remote Code Execution (RCE) vulnerability in Microsoft's MSHTML browser engine, which was patched last September, increased dramatically during the second quarter of this year. Last quarter,…
  • "Ensuring Privacy Protections for People Whose Genomic Information Is Stored among a Global Collection of Personal Data"
    Erman Ayday, an assistant professor of computer and data sciences at Case Western Reserve University, has been awarded a National Science Foundation (NSF) Faculty Early Career Development Program (CAREER) grant. The new five-year, $500,000 grant will…
  • "Business Email Compromise (BEC) Market Worth $2.8 Billion By 2027"
    According to a new report from MarketsandMarkets, the Business Email Compromise (BEC) Market size is expected to grow from an estimated value of $1.1 billion in 2022 to $2.8 billion by 2027. Increased incidents of BEC scams, spear-phishing attacks,…
  • "Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels"
    Mac security specialist Patrick Wardle discovered an injection flaw connected to how macOS handles software updates on the system that could allow attackers to access all files on Mac devices.  The researcher demonstrated how threat actors could…
  • "Russian Hackers Target Ukraine with Default Word Template Hijacker"
    Analysts tracking cyberattacks against Ukraine report that the notorious Russian state-backed hacking group called Gamaredon is still heavily targeting the country. Gamaredon, also known as Armageddon or Shuckworm, is a group of Russian hackers believed…
  • "The Zoom Installer Let a Researcher Hack His Way to Root Access on macOS"
    A security researcher has discovered how an attacker can use the macOS version of Zoom to gain complete control of the operating system. The exploit was detailed in a presentation given by Mac security specialist Patrick Wardle at the DefCon hacking…
  • "3 Ways China's Access to TikTok Data is a Security Risk"
    TikTok has come under fire in recent months. Both lawmakers and citizens in the US have questioned its data collection practices and potential ties to the Chinese state. Researchers found that data of some American users had been repeatedly accessed from…
  • "This String of Emojis Is Actually Malware"
    In the future, hackers could compromise someone simply by sending a random string of emojis to their computer or cellphone. When hackers discover a flaw in a target computer or cellphone, they create an exploit or piece of code designed to exploit the…
  • "Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer Firm"
    The Dutch Fiscal Information and Investigation Service (FIOD) recently arrested a 29-year-old man in Amsterdam on August 10 in connection with the recent U.S. Treasury sanctions on decentralized Ethereum mixing service Tornado Cash.  The individual…
  • "'Evil PLC' Could Turn PLCs into Attack Vectors"
    When thinking of someone hacking a Programmable Logic Controller (PLC), one would typically think of the PLC as the final target of the attack. Adversaries use other systems to get to what will eventually allow them to cause industrial havoc. However,…
  • "Credential Phishing Attacks Skyrocketing, 265 Brands Impersonated in H1 2022"
    Abnormal Security researchers discovered a 48% increase in email attacks over the previous six months, and 68.5% of those attacks included a credential phishing link.  The researchers noted that in addition to posing as internal employees and…