News
-
"A New Feature Selection Technique For Intrusion Detection Systems"Network-based technologies continue to grow in use among individuals, professionals, and businesses worldwide. However, most network-based systems have been discovered to be significantly vulnerable to attacks. A malicious attack on network-based systems…
-
"Phishing Continues to Be One of the Easiest Paths for Ransomware"According to a new survey conducted by the enterprise data storage company Cloudian, phishing remains one of the main ways to attack organizations. The survey includes insights from 200 IT decision-makers whose organizations were hit with a ransomware…
-
"Google Finds Zero-Day Security Flaws in All Your Favorite Browsers"Google's Threat Analysis Group (TAG) has shared details about four zero-day security vulnerabilities found in popular web browsers, including Google Chrome, Internet Explorer, and Safari. The zero-day flaws discovered in these web browsers were exploited…
-
"Researchers Find Big Flaw in a Schneider Electric ICS System Popular in Building Systems, Utilities"Researchers at a security firm called Armis discovered a vulnerability in Schneider Electric computer control systems which is popular in heating, air conditioning, and other building systems that could allow hackers to control them. The remote…
-
"Updated Joker Malware Floods into Android Apps"The Joker premium billing-fraud malware is back on Google Play in a fresh onslaught, with an updated bag of tricks to evade scanners. Joker has been around since 2017, disguising itself within common, legitimate apps like camera apps, games, messengers,…
-
"Ransomware Giant REvil’s Sites Disappear"Just days after President Biden demanded that Russian President Putin shut down ransomware groups, the servers of one of the most prominent groups mysteriously went dark. Researchers stated that all of REvil’s Dark Web sites slipped offline. It is…
-
"Iranian Hacker Group TA453 Caught Phishing University Scholars"Proofpoint researchers recently discovered the Iran-linked hacker group TA453 carrying out a credential-stealing phishing operation called Operation SpoofedScholars. The TA453 threat actors masqueraded as British scholars with the University of London's…
-
"SolarWinds Patches Zero-Day Exploited in the Wild (CVE-2021-35211)"SolarWinds has released an emergency patch for CVE-2021-35211, an RCE vulnerability affecting its Serv-U Managed File Transfer and Serv-U Secure FTP currently being exploited in the wild. Microsoft has provided evidence of limited, targeted customer…
-
"Russia-based APT28 Linked to Mass Brute Force Attacks Against Cloud Networks"Many cyber espionage campaigns have been linked to Russian hackers. Federal agencies of the U.S. and the U.K. recently warned about a number of brute force attacks executed by the Russia-based APT28 cybercriminal group. The agencies' joint report…
-
"New Tool Automatically Finds Buffer Overflow Vulnerabilities"A team of researchers at Carnegie Mellon University's CyLab designed a new tool called SyRust to automatically check for memory bugs—the types of bugs that can lead to buffer overflow exploits. Their tool specifically checks for such bugs in Rust…
-
"The Ransomware Crime Wave Has Made Zero Trust Critical"Due to the increase in ransomware attacks that have shaken the U.S. in recent weeks, researchers suggest that now is the time to focus on zero trust. The idea of basing cybersecurity on a zero trust model is not a new concept, but it’s an idea…
-
"Sage X3 Vulnerabilities Can Pose Serious Risk to Organizations"Researchers at the cybersecurity firm Rapid7 discovered four vulnerabilities in the Sage X3 enterprise resource planning (ERP) product, posing a significant risk to organizations. One of the flaws has been rated critical, while the rest were rated medium…