News
-
"Attackers Exploit URL Protections to Disguise Phishing Links"Barracuda researchers found cybercriminals using URL protection services to hide phishing links. The company observed phishing campaigns using three URL protection services to mask phishing URLs and send victims to credential-stealing websites.
-
"Hackers Beware: Research Shows AI Can Assist With Cybersecurity"According to a recent paper by University of Missouri researcher Prasad Calyam and collaborators from Amrita University in India, Artificial Intelligence (AI)-powered chatbots can pass a cybersecurity exam but should not be relied on for complete
-
"A Simple Firmware Update Completely Hides a Device's Bluetooth Fingerprint"A smartphone's unique Bluetooth fingerprint could be used to track the device's user. To eliminate this vulnerability, a team of researchers at UC San Diego has developed a simple firmware update that completely hides the Bluetooth fingerprint.
-
"New Blast-RADIUS Attack Breaks 30-Year-Old Protocol Used in Networks Everywhere"One of the most widely used network protocols, Remote Authentication Dial-In User Service (RADIUS), is vulnerable to a newly discovered attack called "Blast-RADIUS." This complex attack enables adversaries to gain control over various environments, inc
-
"NIST Will Fire the 'Starting Gun' in the Race to Quantum Encryption"ML-KEM, CRYSTALS-Dilithium, and Sphinx Plus are three standardized post-quantum algorithms that will allow classical computers to encrypt data against a future fault-tolerant quantum computer.
-
"Akira Ransomware: Lightning-Fast Data Exfiltration in 2-ish Hours"According to the BlackBerry Threat Research and Intelligence Team, "Akira" ransomware actors can now exfiltrate data from victims in just over two hours, a significant change in the average time it takes a cybercriminal to get to the stage where they c
-
"Critical Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments"The Exim mail transfer agent has a critical security flaw that could allow threat actors to send malicious attachments to target users' inboxes. Exim is a free mail transfer agent used in hosts running Unix or Unix-like operating systems.
-
"Hacker 'Tank' Gets Prison Sentence for Connections to Zeus and IcedID Malware"A Nebraska federal judge has sentenced a Ukrainian national named Vyacheslav Igorevich Penchukov (known as "Tank" in the hacker community) to prison and ordered him to pay millions in restitution for his involvement in two malware schemes.
-
"WP Time Capsule Plugin Update Urged After Critical Security Flaw"Security researchers at Patchstack have recently found a new vulnerability in the Backup and Staging by WP Time Capsule plugin, affecting versions 1.22.20 and below.
-
"Purdue University Researchers Win ASEE Best Paper Award for Research Integrating Systems Thinking in Threat Modeling"Researchers from Purdue University won the American Society for Engineering Education's (ASEE) Best Paper award for their work titled "Introducing Systems Thinking as a Framework for Teaching and Assessing Threat Modeling Competency."
-
"Data of Millions of mSpy Customers Leaked Online"According to security researchers at Have I Been Pwned, over 310 gigabytes of data from spyware maker mSpy, including 2.4 million unique emails, was leaked online in June.
-
"AT&T Paid a Hacker $370,000 to Delete Stolen Phone Records"US telecom giant AT&T, which disclosed Friday that hackers had stolen the call records for tens of millions of its customers, allegedly paid a member of the hacking team more than $300,000 to delete the data.