News
-
"Chaos Malware Walks Line Between Ransomware and Wiper"Researchers at Trend Micro have discovered an under-construction malware called Chaos, which is being advertised on an underground forum as being available for testing. While it calls itself ransomware, an analysis revealed that it’s actually more of a…
-
"New Android Trojan Hijacks Social Media"Researchers at Zimperium have uncovered a new type of Android Trojan attack that spreads via social media hijacking. The new Android Trojan is codenamed FlyTrap and has hit at least 140 countries since March 2021 and has spread to over 10,000 victims…
-
"Fundamental Flaw in RNGs Affects Many IoT Devices"According to researchers Allan Cecil and Dan Petro from Bishop Fox, most modern Internet of Things (IoT) devices have flawed hardware-based Random Number Generators (RNGs). These RNGs have a fundamental flaw that weakens the security of the encryption…
-
"New 'Glowworm Attack' Recovers Audio From Devices' Power LEDs"Researchers at the Ben-Gurion University of the Negev have demonstrated a method for spying on electronic conversations. They released a new paper outlining a novel passive form of the TEMPEST attack called Glowworm. The Glowworm attack transforms minute…
-
"1M Stolen Credit Cards Hit Dark Web for Free"Researchers have discovered that threat actors have leaked 1 million stolen credit cards for free online as a way to promote a relatively new and increasingly popular cybercriminal site dedicated to selling payment card credentials. The cards were…
-
"Engineer at Sandia Labs Turns Error Detection into 'Secret Language' for Data Security"Celestino Corral, an electrical engineer at Sandia National Laboratories (SNL), developed a method that uses error-checking computer code to improve the security of digital content, such as email and social media messaging. Corral started working on…
-
"Salesforce Communities Could Expose Business-Sensitive Information"Researchers at Varonis have found that numerous publicly accessible Salesforce communities are misconfigured and could expose sensitive information. A Salesforce Community site lets customers and partners interface with a Salesforce instance from…
-
"Do You Hear What I Hear? A Cyberattack."Cybersecurity analysts work with a significantly large amount of data, especially in the performance of activities such as monitoring network traffic. Yang Cai, a senior systems scientist at CyLab, stresses that important patterns often get buried by a…
-
"Hackers Build a Better Timing Attack to Crack Encryption Keys"Mathy Vanhoef, a postdoctoral researcher at New York University Abu Dhabi, along with Tom Van Goethem of KU Leuven's imec-DistriNet research group, have developed a new type of timing attack that can crack encryption more efficiently. Timing attacks are…
-
"CISA Releases New Training Guide for Government Cyber Workforce"The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released a new training guide, titled the Cybersecurity Workforce Training Guide. This guide is intended to help IT professionals within the Federal and…
-
"May 2021 Saw a 440% Increase in Phishing, The Single Largest Phishing Spike on Record"Researchers at Webroot Brightcloud published some of their findings in their mid-year threat report recently. The researchers found that around half of businesses (45.49%) and consumers (52.35%), on average, saw at least one sustained additional…
-
"Average Ransomware Demands Surge by 518% in 2021"The Unit 42 security consulting group released new results found during their research that show that the average ransomware demands surged by 518% in the first half of 2021 compared to 2020, while payments climbed by 82% in the same period. The…