News
  • "Smishing and Vishing Attempts Surged in 2021"
    Security researchers at Proofpoint found that SMS phishing (smishing) attacks more than doubled year-on-year in 2021 as cybercriminals looked to exploit human error to compromise devices.  The researchers conducted a study analyzing over 2.6 billion…
  • "Cyberattack Surface 'Spiralling Out of Control'"
    In a new study, security researchers at Trend Micro polled over 6200 IT and business decision makers.  They found that global organizations are still beset with cyber visibility and control challenges, with two-fifths (43%) admitting their digital…
  • "Zhang Lab Takes on Cyber-Physical System Hackers"
    Ning Zhang, assistant computer science and engineering professor at the McKelvey School of Engineering at Washington University in St. Louis, wants to develop a new security capability to ensure safety against cyberattacks on pacemakers, autonomous…
  • "Perfect Privacy Technology and Chasing Rainbows"
    Data-driven innovation, whether in the form of tailored medicine, public services, or efficient industrial production, promises to significantly benefit people and the environment, and provide widespread access to data. However, aggressive data…
  • "Critical Vulnerability Found in Motorola's Unisoc Chips"
    Security researchers at Checkpoint Research have recently spotted a critical vulnerability in the Unisoc Tiger T700 chips that power the Motorola Moto G20, E30, and E40 smartphones.  The researchers noted that due to the flaw, the smartphones were…
  • "Millions of MySQL Servers are Publicly Exposed"
    Security researchers at Shadow Server Foundation have discovered that more than 3.6 million MySQL servers are publicly exposed on the internet.  During their research, the researchers simply issued a MySQL connection request on default port 3306 to…
  • "YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links"
    A new CMD-based ransomware variant is still under development, but researchers at Trend Micro warn that its poisonous combination of multiple layers of obfuscation and the sneaky integration of legitimate service links into its attack make it a…
  • "Gathering Momentum: 3 Steps Forward to Expand SBoM Use"
    According to a recent ReversingLabs study conducted by Dimensional Research, less than a third of companies today use Software Bills of Materials (SBoMs). Half of those said the process of creating and reviewing SBoMs involves manual steps, which is a…
  • "Government Agencies Seize Domains Used to Sell Credentials"
    The Federal Bureau of Investigation (FBI) and the US Department of Justice (DOJ) announced the seizure of three domains following an international investigation that discovered these domains selling stolen personal information and providing access to…
  • "Apple Blocked 1.6 Million Risky, Vulnerable Apps in 2021"
    Last year, Apple says its App Store fraud prevention mechanisms stopped potentially fraudulent transactions totaling roughly $1.5 billion.  Apple noted that throughout 2021, they prevented more than 3.3 million stolen credit cards from making…
  • "The Costs and Damages of DNS Attacks"
    EfficientIP has shared findings from its eighth annual 2022 Global DNS Threat Report, conducted by IDC, revealing the significant impact of Domain Name System (DNS) attacks on global organizations' operations over the past year. The report highlights…
  • "Critical U-Boot Vulnerability Allows Rooting of Embedded Systems"
    Security researchers at NCC Group have discovered a critical vulnerability in the U-Boot boot loader.  An open-source boot loader, U-Boot is used in various types of embedded systems, including ChromeOS and Android.  It supports multiple…