News
  • "Indiana Contact Tracing Data Breached"
    It has been discovered that nearly 750,000 residents of Indiana have been impacted by the data breach involving responses collected via the Hoosier State's COVID-19 online contact tracing survey.  An unnamed vulnerability-hunting company discovered…
  • "Phishing Costs Surge to $15m Annually for US Organizations"
    The security vendor Proofpoint commissioned the Ponemon Institute to poll nearly 600 IT and IT security practitioners to compile its latest Cost of Phishing study.  The researchers found that the average cost of phishing for large US organizations…
  • "Troubling New Disk-Level Encryption Ransomware Surfaces"
    A new ransomware variant dubbed DeepBlueMagic has been discovered by researchers at Heimdal Security. According to the researchers, DeepBlueMagic targets different disk drives on a target organization's servers instead of encrypting files on endpoint…
  • "Mandiant, CISA Urge ThroughTek Customers to Fix Software Bug in Millions of Baby Monitors, Cameras"
    Researchers at FireEye's threat intelligence and incident response unit Mandiant have discovered a software flaw that leaves millions of Internet of Things (IoT) devices vulnerable to remote attacks. Hackers could use this vulnerability to intercept…
  • "Devices From Many Vendors Can Be Hacked Remotely Due to Flaws in Realtek SDKs"
    Numerous Internet of Things (IoT) Systems may be exposed to remote hacker attacks because of vulnerabilities discovered in Software Development Kits (SDKs) provided by the Taiwan-based semiconductor company Realtek to device manufacturers. Researchers at…
  • "Colonial Pipeline Reportedly Admits Data Breach"
    Colonial Pipeline had reportedly admitted that nearly 6000 individuals might have had their personal information compromised by ransomware attackers when they struck earlier this year.  The fuel pipeline operator, which was crippled by the attack in…
  • "Misconfigured Server Leaks US Terror Watchlist"
    Researchers a Comparitech have discovered that a secret watchlist of suspected terrorists maintained by the FBI was exposed online after a configuration error. The researchers found the Terrorist Screening Center (TSC) list on July 19, when the exposed…
  • "How Hackers Can Use Message Mirroring Apps to See All Your SMS Texts — And Bypass 2FA Security" 
    The implementation of Two-Factor Authentication (2FA) has become a necessity as the use of usernames and passwords alone is not enough to securely access online services. 2FA provides an extra layer of security to the username/password system. Studies…
  • "Hackers Can 'Poison' Open-Source Code on the Internet"
    Researchers at Cornell Tech have discovered a new kind of online attack capable of manipulating natural-language modeling systems and circumventing known defenses. Code poisoning attacks can lead to consequences ranging from the modification of movie…
  • "Annual EPIC App Challenge Invites Contestants to Showcase Cyber Defense Skills"
    The annual Emerging Professionals in the Intelligence Community (EPIC) App Challenge welcomes corporate and individual contestants to demonstrate their analysis and critical thinking skills to technical leaders and senior executives in the Intelligence…
  • "T-Mobile Investigates Potentially Massive Breach of Consumer Data"
    T-Mobile is investigating claims by a hacker that they have put sensitive information about more than 100 million of its customers up for sale after breaching its servers.  The data set includes names, Social Security numbers, addresses, phone…
  • "Dallas Loses 8TB of Criminal Case Data"
    A large cache of criminal case data belonging to the Dallas Police Department (DPD) is thought to have been lost forever.  About 22 terabytes of data went missing from the DPD computer database when data was migrated from an online, cloud-based…