News
-
"Process Ghosting: A New Executable Image Tampering Technique in the Wild"Elastic Security uncovered a new image tampering attack called Process Ghosting. Remote hackers are using this new type of executable image-altering technique to deploy malware on a targeted Windows system stealthily. Process Ghosting escapes anti-…
-
"Amazon Prime Day - Beware of Phishing Deluge, Experts Warn"Security researchers at Tessian have warned online shoppers to beware of scam emails and texts over the next couple of days as the Amazon Prime Day e-commerce bonanza gets underway. The most common tactic used by scammers will be to impersonate Amazon in…
-
"Attackers Find New Way to Exploit Google Docs for Phishing"Researchers at the email and collaboration security firm Avanan have discovered a new method that attackers are using to trick victims into visiting malicious phishing websites via Google Docs. The attack begins with the threat actor sending an email,…
-
"Bipartisan Bill to Prevent International Cybercrime Reintroduced"A bipartisan group of U.S. senators recently reintroduced the International Cybercrime Prevention Act, which is aimed at arming law enforcement with the tools needed to combat cybercrime and better protect Americans. The bill, first introduced in 2018,…
-
"CVS Health Records for 1.1 Billion Customers Exposed"Security researchers at WebsitePlanet found the non-password-protected database, which had no form of authentication in place to prevent unauthorized entry, on March 21. The database contained information about CVS Health customers. The researchers…
-
"New Buer Malware Loader Spread Through DHL Scam Email"According to researchers at Proofpoint, attackers are using fake DHL shipping emails to trick recipients into opening malicious Word and Excel documents that lead to an infection of 'RustyBuer,' a new variant of the Buer Loader malware family written in…
-
"Colorado Passes New Privacy Act"Colorado has unanimously passed a new data privacy act to safeguard Coloradoans' personal information. The Colorado Privacy Act is due to take effect on July 1, 2023, and now awaits the signature of state governor Jared Polis. Should the Act…
-
"A New Tool Wants to Save Open Source From Supply Chain Attacks"The NotPetya malware attack and the recent SolarWinds cyberespionage campaign both present real-world examples of software supply chain attacks in which a hacker slips malicious code into legitimate, widely used software. Supply chain security has become…
-
"A Study Develops a New Protocol That Makes Cryptocurrency Transactions Faster and Safer"Security and privacy researchers at TU Wien, together with the IMDEA Software Institute and Purdue University, have developed a protocol aimed at improving the security and speed of transactions in cryptocurrencies such as Bitcoin. Cryptocurrencies are…
-
"Carnival Cruise Cyber-Torpedoed by Cyberattack"Carnival Corp., the world’s largest cruise ship operator, has sprung another leak. Carnival, in a data breach notification, stated that it appears that in mid-March, an unauthorized third party gained access to certain personal information relating to…
-
"Government Faces Increasing Threat from Stolen Accounts"Findings from TransUnion's Public Sector Fraud Study suggest that despite the increase in the frequency and severity of fraud threats against government agencies during the COVID-19 pandemic, agencies still have not taken appropriate actions to address…
-
"Critical Flaws in Defibrillator Management Tool Pose Account Takeover, Credential Risk for Hospitals"The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has issued an Industrial Controls Systems (ICS) Medical Advisory on the discovery of multiple vulnerabilities in the ZOLL Defibrillator Dashboard. The…