-
"Belgian, Dutch Police Dismantle Cybercrime Group"Europol recently announced that police have dismantled a cybercrime group that made millions of euros through phishing and other types of schemes. The operation was conducted by police in Belgium and the Netherlands, with support from Europol. The…
-
"Critical PHP Flaw Exposes QNAP NAS Devices to RCE Attacks"QNAP has issued a warning to customers that some of its Network Attached Storage (NAS) devices (with non-default configurations) are vulnerable to attacks that take advantage of a three-year-old critical PHP vulnerability, which allows Remote Code…
-
"Cobalt Strike And CredoMap Malware Used by Russian Government Hackers to Attack Ukraine"According to the Ukrainian Computer Emergency Response Team (CERT-UA), Russian hacker gangs have been using the Follina code execution vulnerability in recent phishing attempts to install the CredoMap malware and Cobalt Strike beacons. The APT28 hacking…
-
"These Fake Voicemail Phishing Emails Want To Steal Your Passwords"Criminals are performing voice phishing (vishing) attacks to trick people in the US military and technology organizations into revealing credentials for Microsoft Office 365 software and Outlook email accounts. According to US security firm Zscaler,…
-
"Gartner: Regulation, Human Costs Will Create Stormy Cybersecurity Weather Ahead"Gartner has unveiled the top 8 cybersecurity predictions for 2022 through 2023. Richard Addiscott, Senior Director Analyst, and Rob McMillan, Managing Vice President at Gartner, discussed the top predictions prepared by Gartner cybersecurity experts to…
-
"Protecting Computer Vision From Adversarial Attacks"With advancements in computer vision and Machine Learning (ML), various technologies can now do complex tasks with little or no human oversight. Many computer systems and robots use visual information to make critical decisions, from autonomous drones…
-
"Using More Complex IT Security Strategies Does Not Necessarily Increase Security, Survey Finds"According to a survey conducted by Hornetsecurity, organizations activated more Microsoft 365 security features in the last year as cyberattacks increasingly targeted them. The global IT security and compliance survey of over 800 IT professionals…
-
"Researcher Hacks Into Backend for Network of Smart Jacuzzis"A security researcher was able to hack into the backend of a series of Jacuzzi smart hot tubs. Like other Internet of Things (IoT) devices, the Jacuzzi SmartTub allows users to control the settings of their tub from a distance using their phone or…
-
"New ToddyCat APT targets MS Exchange servers in Europe, Asia"Security researchers at Kaspersky have discovered a new advanced persistent threat (APT) targeting Microsoft’s Exchange servers in Europe and Asia. Dubbed ToddyCat, the APT actor utilizes two formerly unknown tools Kaspersky called ‘Samurai…
-
"Researchers Reveal 56 OT Bugs in "Icefall" Report"Security researchers at Forescout have recently disclosed 56 new vulnerabilities in 10 operational technology (OT) vendors’ products. The researchers say the vulnerabilities found demonstrates significant “insecure-by-design” practices. The…
-
"Amazon is Opening a Center For Quantum Networking Research"Several major companies, including IBM and Google, are currently working on quantum computing projects. Amazon is also in the mix. Amazon opened the AWS Center for Quantum Computing last year and has offered quantum computing via Amazon Web…
-
"Select Hillrom Electrocardiograph Products Impacted by Medical Device Vulnerabilities"According to an advisory released by the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), there are two medical device vulnerabilities in select Hillrom electrocardiograph products that could lead to unauthorized…
News