News
-
"TrickBot: Attackers Using Traffic Violation Scam to Spread Malware"The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI revealed a new phishing scheme in which attackers use fake traffic violations to infect victims with TrickBot and steal sensitive information. The attack begins with someone…
-
"Remote Code Execution Vulnerabilities Uncovered in Smart Air Fryer"Researchers from Cisco Talos found two remote code execution (RCE) vulnerabilities in the Cosori Smart Air Fryer, an Internet-connected kitchen product that allows users to have remote control over cooking temperature, times, and settings. The…
-
"Geico Data Breach Opens Door to Unemployment Scams"Security researchers have discovered that adversaries repeatedly stole driver’s license numbers from a database maintained by Geico over the course of six weeks earlier this year. The security researchers found that the perpetrators of the breach used…
-
"Defending Against Cybersecurity Moles Inside Your Agency"Insider threats are often considered to be either disgruntled employees or people who have made errors. However, in the age of COVID-19, insider threats are changing. An insider is now more likely to be a remote employee who appears completely…
-
"COVID-19-Themed Cyberattack Detections Continue to Surge"McAfee researchers examined cybercriminal activity related to malware and the evolution of cyber threats in the third and fourth quarters of 2020. They published their findings in a new report. In Q4, there was an average of 648 threats per minute…
-
"Phishing Attacks Actively Using Alternative Exfiltration Methods Including Google Forms and Telegram Bots"According to researchers with the cyber intelligence firm Group-IB, cybercriminals are frequently using legitimate services to gather stolen data from exploit kits in the performance of phishing attacks. The researchers have found that hackers are often…
-
"Vulnerabilities in OpENer Stack Expose Industrial Devices to Attacks"Researchers with the industrial cybersecurity firm Claroty recently disclosed five vulnerabilities in the OpENer Ethernet/IP (ENIP) stack designed for I/O adapter devices. The OpENer stack supports multiple I/O and explicit connections. It implements the…
-
"Cybersecurity in the Blue Economy"The oceans and seas cover over two-thirds of the Earth's surface. These waters are expected to add $3 trillion to the global economy over the next decade through the generation of electricity via marine renewable energy (MRE) devices, which could reduce…
-
"Over Half of Malware Delivered via Cloud Applications"According to a study from Netskope, over 60 percent of malicious payloads were sent via cloud-based apps in 2020. That is an increase from 48 percent of malware samples delivered via cloud applications in 2019. This discovery brings further attention to…
-
"NSA Alerts About Four Critical Vulnerabilities in Microsoft Exchange Servers"The National Security Agency (NSA) issued alerts about four critical vulnerabilities found in 2013, 2016, and 2019 versions of the Microsoft Exchange Server. The exploitation of these vulnerabilities could allow attackers to perform remote code execution…
-
"Global Attacker Dwell Time Drops to Just 24 Days"Researchers from FireEye conducted a new study where they analyzed targeted attack activity between October 1, 2019, and September 30, 2020. The researchers compiled their findings in a report called M-Trends 2021. The researchers found that 59% of…
-
"DHS S&T Expands Pilot of Cybersecurity Tech for Emergency Communications Centers"The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has expanded pilot testing of a technology solution aimed at strengthening the cybersecurity of the nation's emergency communications infrastructure. SecuLore…