News
-
"Building a Better 'Canary Trap'"A canary trap in espionage is the spread of multiple versions of false documents to hide a secret. The canary trap technique can be used to detect information leaks or create distractions that conceal valuable information. A team of researchers at…
-
"CISA Begins Cataloging, Publicizing Bad Cyber Practices"The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) is cataloging bad cybersecurity practices to help critical infrastructure providers improve the prioritization of their cybersecurity responsibilities. The…
-
"Smart Home Experiences Over 12,000 Cyber-Attacks in a Week"According to a new investigation, smart homes could experience more than 12,000 cyberattacks in a single week. The consumer group Which? partnered with NCC Group and the Global Cyber Alliance (GCA) to conduct an experiment in which a home was filled with…
-
"Hacked Data for 69K LimeVPN Users Up for Sale on Dark Web"According to researchers, the VPN provider known as LimeVPN has been hit with a data breach affecting 69,400 user records. Recently a hacker claimed to have stolen the company’s entire customer database before knocking its website offline. The stolen…
-
"Microsoft Reveals Authentication Failures, System Hijack Vulnerabilities in Netgear Routers"Microsoft's team of security researchers discovered three vulnerabilities in Netgear DGN-2200v1 series routers, running firmware before v1.0.0.60. The researchers have stressed that these vulnerabilities could allow attackers to roam freely through an…
-
"Malware Actors Have Begun Using AutoHotkey Scripts For Attacks"Living-off-the-Land (LotL) attacks involve the use of trusted pre-installed system tools to avoid installing foreign files or tools, thus allowing threat actors to hide their malicious activity. New LotL attacks have been overserved using AutoHotkey,…
-
"Business Professors Study Ideal Responses to Ransomware Attacks"Business professors and a doctoral student at the University of Texas at Arlington (UTA) are looking at how ransomware attacks, in some cases, can set organizations against the law enforcement agencies that are trying to protect them. Their study…
-
"Data Breach at Las Vegas Hospital"An investigation has been launched into a data breach that occurred in June at a hospital in Las Vegas. The University Medical Center (UMC) is a nonprofit public hospital affiliated with the Kirk Kerkorian School of Medicine at UNLV and operated by the…
-
"CISA Releases New Ransomware Self-Assessment Security Audit Tool"The US Cybersecurity and Infrastructure Security Agency (CISA) has released the Ransomware Readiness Assessment (RRA), a new module for its Cyber Security Evaluation Tool (CSET). RRA is a security audit self-assessment tool for organizations that want to…
-
"High-Severity Vulnerabilities Found in Several Phoenix Contact Industrial Products"The Germany-based industrial solutions provider Phoenix Contact recently informed customers about ten vulnerabilities that have been identified across many of its products. Advisories published by Phoenix Contact and Germany's CERT VDE say the…
-
"IT, Healthcare, and Manufacturing Facing Most Phishing Attacks"Researchers at the email and collaboration security firm Avanan analyzed over 905 million emails for the 1H 2021 Global Phish Cyber Attack Report. The company discovered that their customers in the IT, healthcare, and manufacturing industries are most…
-
"End Users in the Dark About Latest Cyberthreats, Attacks"A survey was conducted by the IoT security firm Armis to which 2,000 employees across various industries responded. They were surveyed on their knowledge pertaining to current security events and best practices. The results from the survey show that…