News
-
"What is The Real Cost of Ransomware?"Cybereason released research findings from a global ransomware study of nearly 1,300 security professionals that reveals that more than half of organizations have been victims of a ransomware attack. The research also reveals that 80 percent of…
-
"This Strange Malware Stops You From Visiting Pirate Websites"Sophos researchers have discovered a new strain of malware that blocks infected users from visiting websites dedicated to software piracy. Some samples were found buried in archives disguised as software packages advertised through the Discord platform.…
-
"How the FBI Recovered Bitcoin Ransom Paid to Darkside Ransomware Gang"FBI recovers a chunk of the BITCOIN Ransom paid for the Colonial Pipeline ransom attack. The victim contacted the FBI and then agreed to pay the ransom. The FBI was able to track the origin back to a hacking group called Darkside. They followed the…
-
"60% of Businesses Would Consider Paying a Ransomware Demand"A new study by researchers at Neustar International Security Council (NISC) surveyed 304 senior professionals across six EMEA and US markets. The researchers found that three in five (60%) of organizations would consider paying an extortion demand in the…
-
"Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet"Thousands of VMware vCenter Servers, containing two recently disclosed critical vulnerabilities, are still publicly accessible on the Internet three weeks after the company called on organizations to patch the flaws. The exploitation of the…
-
"IoT Supply Chain Bug Hits Millions of Cameras"Security experts from Nozomi Networks have warned of a critical IoT supply chain vulnerability that may affect millions of connected cameras globally, allowing attackers to hijack video streams. Nozomi Networks revealed the flaw in a popular software…
-
"A Backdoor In Mobile Phone Encryption From the 90s Still Exists"Researchers from Ruhr-Universität Bochum (RUB), in collaboration with colleagues from France and Norway, analyzed the encryption algorithm GEA-1, which was implemented in mobile phones in the 1990s for data connection encryption. They found that the GEA-…
-
"Elekta Data Breach Leaks Patient Info at Oklahoma Cancer Center"The Cancer Centers of Southwest Oklahoma recently announced that it was involved in a data breach that may have leaked sensitive patient information. The data security incident occurred on April 28 through Elekta, a Swedish software company and business…
-
"Peloton Bike+ Bug Gives Hackers Complete Control"Researchers from McAfee's Advanced Threat Research (ATR) team discovered that the popular Peloton Bike+ and Peloton Tread exercise equipment contain a security vulnerability that could expose gym users to a wide variety of cyberattacks. According to the…
-
"A Big Step Towards Cybersecurity's Holy Grail"A significant advancement towards a user-friendly computing environment, in which the guarantee of security is as strong as a mathematical proof, has been made by a team of researchers at Carnegie Mellon University's CyLab. They revealed a new provably…
-
"Researchers Explore Continuous Liveness Detection for Voice Biometrics"A new study by scientists from Florida State University and Rutgers University delved into the possibility of continuous liveness detection for voice biometrics implemented on smart devices. They released a paper with the goal of strengthening security…
-
"NATO Warns it Will Consider a Military Response to Cyber-Attacks"NATO has warned it is prepared to treat cyberattacks in the same way as an armed attack against any of its allies and issue a military response against the perpetrators. In a communique issued by governments attending the meeting of the North Atlantic…