News
  • "Safer Web Surfing With a New Method for Detecting Malicious Modes"
    Researchers Yong-joon Lee of Far East University and Won-shik Na of Namseoul University, both in the Republic of Korea, have described a novel method for detecting hidden malicious code in websites. In contrast to currently employed methods, their…
  • "Businesses Are Adding More Endpoints, But Can’t Manage Them All"
    Security researchers at Ponemon Institute conducted a survey and discovered that most enterprises struggle to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside…
  • "Cryptocurrency 'Mixers' See Record Transactions From Sanctioned Actors"
    Security researchers at Chainalysis have discovered that the use of so-called cryptocurrency “mixers,” which combine various types of assets to mask their origin, peaked at a 30-day average of nearly $52 million worth of digital currency in April,…
  • "Fewer Fall Victim to Data Breaches as Attackers Switch to Business in 2022"
    According to new research condcuted by Identity Theft Resource Center (ITRC), a US-based non-profit that provides identity crime advice, the number of people falling victim to data breaches has fallen back from last year’s record high.  They put…
  • "CIA Coder Convicted of Massive Leak of US Hacking Tools"
    A former Central Intelligence Agency (CIA) programmer was recently found guilty in New York federal court of the 2017 leak of the US spy agency's most valuable hacking tools to WikiLeaks two years after his initial prosecution ended in a mistrial.  …
  • "PayPal-Themed Phishing Kit Allows Complete Identity Theft"
    Akamai researchers analyzed a phishing kit that leads users through a series of pages and forms intended to gather information that can later be used to steal the victims' identities, commit money laundering, open cryptocurrency accounts, make false tax…
  • "MacOS Bug Could Let Malicious Code Break Out of Application Sandbox"
    Microsoft has disclosed a now-fixed vulnerability in Apple's macOS that would have allowed attackers to elevate device privileges and install additional malicious payloads by enabling certain types of code to circumvent the operating system's App Sandbox…
  • "New Lilith Ransomware Emerges With Extortion Site, Lists First Victim"
    A new ransomware operation called 'Lilith' has been launched, and its first victim has already been posted on a data leak site designed to support double-extortion attacks. JAMESWT discovered Lilith, a C/C++ console-based ransomware designed for 64-bit…
  • "State-Backed Hackers Targeting Journalists in Widespread Espionage Campaigns"
    Since early 2021, many campaigns have been carried out by nation-state hacking groups affiliated with China, Iran, North Korea, and Turkey that target journalists to conduct espionage and spread malware. According to Proofpoint, phishing attempts aimed…
  • "'Luna Moth' Cybercriminals Breach Orgs Through Phony Subscription Renew"
    To steal confidential information from businesses, a new data extortion gang called Luna Moth has broken into their systems and threatened to release the files to the public unless the victims pay a ransom. Since March, the group has been involved in…
  • "Browser Bug Exposes User Data in Top Websites, NJIT Researchers Find"
    Researchers at the New Jersey Institute of Technology (NJIT) discovered an unpatched security bug in most web browsers that allows hackers to monitor specific site visitors while leaving little evidence of a digital trail. The bug can be exploited using…
  • "UF Partners With CIA on Improving Cybersecurity"
    The University of Florida (UF) and the Central Intelligence Agency (CIA) have partnered up to study the applications of Artificial Intelligence (AI) and Machine Learning (ML) to detect and prevent malicious agents that infiltrate computer networks. The…