News
-
"Defending Against Smudge Attacks"Many people use a Personal Identification Number (PIN) to lock their smartphone in order to prevent a third party from accessing their contacts, messages, and other stored information in the event that the device gets lost or stolen. However, a malicious…
-
"Utilities ‘Concerningly’ at Risk from Active Exploits"Utilities’ vulnerability to application exploits goes from bad to worse in just weeks. The amount of time that utility networks spend exposed to a known application exploit has spiked over the past two months. A new report from WhiteHat Security measured…
-
"Attackers Target Volkswagen Vendor; 3.3 Million Audi Customers Impacted"Volkswagen revealed that its third-party vendor faced a data breach that impacted over 3.3 million current customers and prospective buyers of Audi vehicles in the U.S. and Canada. According to a statement released by the German car manufacturer, the…
-
Taking a look behind the Science of SecurityTaking a look behind the Science of Security (Podcast) Our very own Adam Tagert recently featured as a guest on the Cyberwire podcast's Research Saturday show where he discussed the Science of Security. Read more below and check out the podcast (linked…
-
"This Data and Password-Stealing Malware Is Spreading in an Unusual Way"The operators of SolarMarker malware are using PDF documents consisting of many Search Engine Optimization (SEO) keywords to increase visibility on search engines and lead potential victims to the malware on a malicious site posing as Google Drive.…
-
"54% of Senior Executives Struggling to Keep up with Threat Landscape"According to a new report by Fujitsu, more than half (54%) of senior executives have struggled to adapt security policies to changes in the threat landscape and working practices. Fujitsu conducted a survey in September 2020. The findings from the survey…
-
"GitHub Discloses Details of Easy-to-Exploit Linux Vulnerability"GitHub disclosed details about an easy-to-exploit Linux vulnerability classified as high in severity and tracked as CVE-2021-3560. The exploitation of this flaw can enable privileges to be escalated to root on a targeted system. Additionally, the flaw…
-
"McDonald’s Suffers Data Breach"McDonald's was impacted by a data breach that affected customers and employees in South Korea and Taiwan and company operations in the United States. The breach, which was first reported Friday, was the result of a cyberattack. Hackers who broke…
-
"Many Mobile Apps Intentionally Using Insecure Connections for Sending Data"A new study by Symantec analyzed hundreds of thousands of Android and iOS apps released to Google Play and Apple's App Store between 2017 and 2021. The study's goal was to identify apps breaking the green padlock, which indicates a secure communication…
-
"Can Machine Learning Help Detect Zero-Day Malware?"Research has been conducted on the use of Machine Learning (ML) models to improve static malware analysis to detect zero-day exploits as well as untracked malware. The study was performed through a fourth-month academic-private sector partnership between…
-
"What's Behind Rising Ransomware Costs?"The U.S. division of the global meat company JBS made the decision to pay $11 million to the operators behind the ransomware attack launched against its facilities in order to prevent any potential risk for its customers. The company also revealed that…
-
"Texas to Publish Data Breach Notifications"Lawmakers in Texas have passed a bill requiring notices to be published online of any data breaches involving the personal information of 250 or more Lone Star State residents. The unanimously passed House Bill 3746, which amends the Texas Business and…