News
-
"Post-Quantum Chip Has Built-in Hardware Trojan"A team of researchers working with Georg Sigl, Professor of Security in Information Technology at the Technical University of Munich (TUM), has designed and commissioned the production of a computer chip that efficiently implements post-quantum…
-
"Analysis of ICS Exploits Can Help Defenders Prioritize Vulnerability Remediation"The Industrial cybersecurity firm Dragos released results from its analysis of exploits targeting vulnerabilities contained by industrial control systems (ICS) and operational technology (OT) systems. Dragos has tracked over 3,000 ICS and OT…
-
"Amazon Kindle Security Flaws Could Have Let Hackers Hijack Your Device"Security researchers at Check Point Research (CPR) found security flaws in Amazon Kindle, which were patched by the e-commerce giant in a recent Kindle firmware update. The exploitation of the security flaws could have allowed an attacker to obtain…
-
"Apple to Scan iPhones For Child Sex Abuse Images"In new versions of iOS and iPadOS coming this year, before an image is stored onto iCloud Photos, the technology will search for matches of already known Child Sexual Abuse Material (CSAM). Apple stated that if a match is found, a human…
-
"Data Breach at University of Kentucky"During an annual cybersecurity inspection, researchers have discovered that a data breach has occurred at the University of Kentucky that has exposed the personal information of hundreds of thousands of students and staff. More than 355,000 email…
-
"Telegram for Mac Bug Lets You Save Self-Destructing Messages Forever"Reegun Richard Jayapaul, Trustwave SpiderLabs' Lead Threat Architect, discovered new vulnerabilities that could allow users on Telegram for Mac to save specific self-destructing messages and attachments forever or view them without the sender knowing.…
-
"Water Utilities Ill-Prepared to Deal with Cyber Threats"The cyberattack on a water treatment facility in Oldsmar, Florida, in which a malicious actor compromised a control system and attempted to taint the municipal water supply, drew further attention to the importance of improving cybersecurity for water…
-
"Over 60 Million Americans Exposed Through Misconfigured Database"Security researchers at vpnMentor have discovered an online Elasticsearch database completely unsecured and exposed to the public internet, containing the personal details of at least 63 million Americans. The researchers were able to trace the…
-
"Attackers Get Cannier; Found Targeting Non-C-Suite Employees via Spear Phishing"The cloud-enabled security solutions provider, Barracuda, released a new report on spear-phishing attacks. According to the report, an average organization faces more than 700 social engineering attacks each year, with 1 in 10 of these attacks being a…
-
"Decade-Old Router Bug Could Affect Millions of Devices"Security researchers have discovered a 12-year-old router vulnerability that they have warned may affect millions of devices globally. Evan Grant, a researcher at Tenable, initially found the authentication bypass vulnerability in devices from…
-
"Security Researchers Warn of TCP/IP Stack Flaws in Operational Technology Devices"Cybersecurity researchers at Forescout Research Labs and JFrog Security Research have disclosed a set of 14 security vulnerabilities dubbed INFRA:HALT. These vulnerabilities were discovered in TCP/IP stacks commonly used in industrial infrastructure. The…
-
"REvil Most Popular Ransomware Variant in 2021 (So Far)"According to a midyear update from the Accenture Cyber Investigations, Forensics, and Response (CFIR) team, the volume of global cyberattack activity increased by 125 percent in the first half of 2021 compared to the same time frame in 2020. The team's…