News
-
"Algorithms Improve How We Protect Our Data"Scientists at the Daegu Gyeongbuk Institute of Science and Technology (DGIST) in Korea have developed algorithms to more efficiently measure how difficult it would be for an attacker to guess cryptographic systems' secret keys. Their approach could make…
-
"Pulse Secure Patches Critical Zero-Day Flaw"Pulse Secure has patched a critical zero-day vulnerability that multiple APT groups were exploiting to target US defense companies, among other entities. The new security update fixes CVE-2021-22893, a critical authentication bypass vulnerability…
-
"Third Parties Caused Data Breaches at 51% of Organizations"Researchers from Ponemon Institute and third-party remote access provider SecureLink conducted a new study and published their findings in a report titled “A Crisis in Third-party Remote Access Security." The researchers stated that organizations expose…
-
"Computer Scientists Discover New Vulnerability Affecting Computers Globally"Since the discovery of the original Spectre vulnerability, computer scientists from industry and academia have developed software patches and hardware defenses to protect the most vulnerable points in the speculative execution process without sacrificing…
-
"Researchers Find Bugs Using Single-Codebase Inconsistencies"A research team at Northeastern University finds code defects and some vulnerabilities by detecting inconsistent programming in which programmers use different code snippets to implement the same functions. The researchers used Machine Learning (ML) to…
-
"What Can Hackers Do with Your Mobile Number?"Hackers and cybercriminals can do a lot of damage using mobile phone numbers. Using mobile phone numbers, malicious actors could execute SIM swapping attacks, conduct surveillance, and gain access to an individual's online profiles such as Facebook,…
-
"Deepfake Attacks Are About to Surge, Experts Warn"Security researchers from Recorded Future have found that new deepfake products and services are cropping up across the Dark Web. Cybercriminals are increasingly sharing, developing, and deploying deepfake technologies to bypass biometric security…
-
"Paleo Lifestyle Site Found Leaking PII on 70,000 Users"Security researchers at vpnMentor have discovered a misconfigured AWS S3 bucket leaking personal information on 70,000 customers of a popular paleolithic lifestyle site. The researchers found the 290MB trove on February 4 and traced it back to…
-
"Programs within Military Intel Agencies in the US and UK Show Growing Commitment to Neurodiversity"Embracing neurodiversity could serve as an advantage to the cybersecurity field and help fill the cybersecurity workforce gap. The term "neurodiversity" covers conditions, including autistic spectrum disorders, ADHD, dyslexia, OCD, and other conditions…
-
"Experian API Leaks Most Americans’ Credit Scores"A security researcher claims that the credit scores of almost every American were exposed through an API tool used by the Experian credit bureau, which he said was left open on a lender site without even basic security protections. Experian, for…
-
"Data Breach Impacts 1 in 4 Wyomingites"Wyoming's Department of Health (WDH) has recently announced the accidental exposure of personal health information belonging to more than a quarter of people living in Wyoming on GitHub.com. The data breach occurred when fifty-three files…
-
"Watch A Tesla Have Its Doors Hacked Open By A Drone"Ralf-Philipp Weinmann, CEO of Kunnamon, and Benedikt Schmotzle of Comsecuris demonstrated the use of a drone carrying a Wi-Fi dongle to hack and open a Tesla's doors remotely. The remote hack requires no interaction from anyone inside the car. According…