News
-
"5 Items to Monitor to Detect DDoS Attacks"There were 24 percent more distributed denial-of-service (DDoS) attacks in 2020 than in 2019. DDoS attacks increased by 55 percent between January 2020 and March 2021. According to both F5 Networks and IBM X-Force, government agencies were the sixth most…
-
"Critical IoT Camera Flaw Allows for Device Hijacking"Security researchers at Nazomi Networks have discovered another critical bug in IoT security camera systems that could allow attackers to hijack devices. The researchers found a remote code execution vulnerability CVE-2021-32941 in the web service…
-
"Microsoft Warns Thousands of Cloud Customers of Exposed Databases"Microsoft is warning thousands of its cloud computing customers that intruders could be able to read, change, or delete their main databases. A research team at the security company Wiz discovered the vulnerability in Microsoft Azure's flagship Cosmos DB…
-
"Engineering Workstations Are a Concerning Initial Access Vector in OT Attacks"The SANS 2021 OT/ICS Cybersecurity Report shares findings from a survey of 480 individuals from a wide range of industries. The survey showed that almost 70 percent of respondents believe their Operational Technology (OT) environments face high or severe…
-
"Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor"The Ragnarok gang, also known as Asnarok, closed up shop this week, publishing the news to their public website. The cybercriminal group has been active since late 2019. As a parting “gift,” the group released their decryptor, hardcoded with a…
-
"FBI Warns Businesses of New Hive Ransomware"The FBI has issued a warning to firms about an increasingly prolific new ransomware variant known as Hive. The FBI noted that the affiliate-based ransomware uses multiple mechanisms to compromise corporate networks, making it harder for defenders…
-
"Researchers Demonstrate AI Can Be Fooled"Researchers at Purdue University have released a new study, which draws further attention to the possibility of tricking Artificial Intelligence (AI) systems used by image recognition tools, such as those implemented in connected cars to identify…
-
"FIN8 Using an Updated Backdoor"The security firm Bitdefender conducted a forensic analysis of a new backdoor used by the financially motivated threat group FIN8 in recent attacks. FIN8 used the backdoor called Sardonic in attacks against two unidentified financial organizations.…
-
"Phishing Alert! XSS Vulnerability in UPS.com Distributes Malicious Invoice"Phishing remains one of the most common ways for cybercriminals to spread malware and steal personal information. A Cross-Site Scripting (XSS) vulnerability in UPS.com is being used by fraudsters to distribute fake United Parcel Service (UPS) Invoice…
-
"Hackers Exploit WhatsApp Modification Tool to Snoop on Texts, Force Paid Subscriptions"According to researchers at Kaspersky, hackers have inserted the Triada trojan into a modified version of FMWhatsapp, a WhatsApp mod. Such mods have a following among users who want to customize WhatsApp, such as being able to send larger files or…
-
"Revere Health Data Breach Impacts Cardiology Patients"The Personal Identifiable Information (PII) of approximately 12,000 cardiology patients has been exposed in a cyberattack on a healthcare provider based in Utah. Researchers found that patient data in the care of Revere Health was compromised when…
-
Alexandre Bayen is a driving force behind mixed-autonomy trafficCoordinated automation could improve traffic flow, boost efficiency, and slash emissions. A combination of machine learning, big data, and Amazon Web Services is making this future possible. By Sean O'Neill | August 23, 2021