News
-
"'Living Off the Cloud': Hackers Modernize an Old-School Tactic"As governments and other players increasingly rely on the cloud, malicious actors are following suit, reintroducing "living off the cloud" attacks into their operations. "Living off the land" (LotL) schemes involve hackers gaining access to a victim's…
-
"Senators Introduce Bipartisan Quantum Computing Cybersecurity Bill"A bipartisan bill that seeks to strengthen national security against quantum-computing threats has recently been introduced in the US Senate. The Quantum Computing Cybersecurity Preparedness Act addresses federal agencies’ preparedness for quantum…
-
"Citadel Researchers Propose A Deep Learning Technique To Generate DNS Amplification Attacks"Deep learning algorithms have shown promise in detecting and characterizing cybersecurity breaches. However, fraudsters have been working on new attacks to disrupt the operation of various deep learning systems, such as those used for image analysis and…
-
"T-Mobile Settles to Pay $350M to Customers in Data Breach"In a class action lawsuit, T- Mobile agreed to pay $350 million to customers affected by a cyberattack disclosed last August. Personal data like social security numbers were stolen during the cyberattack. In a Securities and Exchange Commission filing on…
-
"1,000 Organizations Exposed to Remote Attacks by FileWave MDM Vulnerabilities"Security researchers at Claroty discovered vulnerabilities affecting a mobile device management (MDM) product from FileWave, exposing many organizations to remote attacks. FileWave MDM product is affected by two critical security holes:…
-
"Hackers Target 10,000 Organizations With a New MFA Bypass in Coordinated Phishing Campaign on Office 365 Users"Microsoft discovered a new Multi-Factor Authentication (MFA) bypass tactic that was used in a coordinated phishing campaign that targeted over 10,000 organizations. According to the company, the attackers used a malicious proxy server to steal login…
-
"Monitoring the Impact of Security Solutions on User Experiences Is Critical"According to Broadcom Software, modern organizations are challenged by conflicting demands to secure the enterprise while providing excellent end-user experiences. Broadcom Software's survey findings reveal that more than half of respondents prioritize…
-
"Raccoon Stealer is Back — How to Protect Your Organization"The Raccoon Stealer Malware-as-a-Service (MaaS) platform rose to prominence several years ago due to its ability to extract data from a web browser. This data initially included passwords and cookies, which allow a recognized device to be authenticated…
-
"QBot Phishing Uses Windows Calculator Sideloading to Infect Devices"The QBot malware's operators have been using the Windows Calculator to side-load the malicious payload onto infected computers. DLL side-loading is a common attack method that takes advantage of how Windows handles Dynamic Link Libraries (DLLs). It…
-
"Cyberattacks on Port of LA Double"Gene Seroka, executive director at the Port of Los Angeles, stated that he has seen an extraordinary increase in cyberattacks targeting the port since the start of the pandemic. The Port of Los Angeles is one of the world’s busiest ports and is the…
-
"French Android And iPhone Users Being Targeted by Roaming Mantis Financial Hackers"Roaming Mantis, a mobile threat operation, has been linked to a new wave of breaches targeting French mobile phone users, months after expanding its scope to include European countries. According to a study released by Sekoia, the active malware…
-
"Researchers Identify a Resilient Trait of Deepfakes That Could Aid Long-Term Detection"The computer vision and security research community has been trying to define an essential characteristic of deepfake videos or signals that may be resistant to advancements in popular facial synthesis technologies. Such technologies include autoencoder-…