News
-
"Agent Tesla Trojan Can Evade Endpoint Protection, Sophos Reports"Sophos researchers have reported the continued refinement of the Trojan called Agent Tesla. New evidence suggests that Agent Tesla is now capable of disabling endpoint protection. Agent Tesla emerged in 2014, spreading through spam emails with…
-
"Recent Sudo Vulnerability Affects Apple, Cisco Products"Researchers at the cybersecurity firm Qualys discovered a bug in the Sudo utility that affects Apple's macOS Big Sur operating system and multiple Cisco products. Administrators can use the Sudo utility to delegate root-level admin authority to specific…
-
"Microsoft Office 365 Attacks Sparked from Google Firebase"Researchers at Armorblox have discovered a savvy phishing campaign that manages to evade native Microsoft security defenses and is bent on stealing Microsoft login credentials. The phishing campaign is using Google Firebase to bypass email security…
-
"Disclosed ICS Vulnerabilities Surged During Second Half of 2020"Researchers at Claroty discovered that a substantial rise in industrial control system (ICS) vulnerabilities were disclosed in the second half of 2020. The research revealed a 33% increase in the number of disclosed ICS vulnerabilities than in the first…
-
"'Zoombombing' Research Shows Legitimate Meeting Attendees Cause Most Attacks"The rapid transition to remote working, learning, and more, due to the COVID-19 virus spread, has sparked an increase in the use of the videoconferencing app Zoom. However, the migration has led to multiple incidents of "Zoombombing" in which uninvited…
-
"Kobalos – A Complex Linux Threat to High Performance Computing Infrastructure"Cybersecurity researchers at ESET researchers have discovered a new form of malware that predominantly targets high-performance computing (HPC) clusters. The malware dubbed Kobalos is portable to Linux, BSD, Solaris, and possibly AIX and Windows…
-
"USC and Amazon Establish Center for Secure and Trusted Machine Learning"The University of Southern California (USC) and Amazon recently announced their partnership aimed at creating a joint research center. This center will focus on the development of new methods to bolster the privacy, security, and trustworthiness of…
-
"Exclusive: Suspected Chinese Hackers Used SolarWinds Bug to Spy on U.S. Payroll Agency – Sources"Security researchers have found that Chinese hackers exploited a flaw in SolarWinds Corp's software to help break into U.S. government computers last year. The attackers used computer infrastructure and hacking tools previously deployed by state-…
-
"Spies Target Gamers With Malware Inserted Into Software Updates, ESET Says"Hackers have targeted gamers for a number of reasons, including stealing data, installing adware, or disrupting gameplay. According to cybersecurity researchers at ESET, a highly targeted malware operation is taking place in Asia. The actors behind the…
-
"Increase in Physical Security Incidents Adds to IT Security Pressures"The results of a survey conducted by the remote video-monitoring service provider Pro-Vigil indicate that many organizations have changed their physical security strategies in response to concerns stemming from the COVID-19 pandemic. There has been an…
-
"Social Media Oversharing Exposes 80% of Office Workers"Researchers at Tessian polled 4000 UK and US professionals and interviewed 10 hackers specializing in social engineering to compile its latest research: How to Hack a Human. The researchers concluded that over 80 percent of British and American…
-
"Proposed Public Health Emergency Bill Targets COVID-19 Tech Privacy"The Public Health Privacy Act was recently introduced by a group of Democratic Senators and Congressional members to address issues regarding the privacy and security of technologies used for COVID-19 response. These technologies include contact tracing…