News
  • "Facebook Debuts Bug-Bounty ‘Loyalty Program’"
    Facebook is creating a loyalty program as part of its bug-bounty offering, hoping to incentivize researchers to find vulnerabilities in its platform.  Facebook bounty hunters will be placed into tiers by analyzing their score, signal, and the number…
  • "Election Systems Under Attack via Microsoft Zerologon Exploits"
    The Cybersecurity Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that advanced persistent threat actors (APTs) are now leveraging Microsoft’s severe privilege-escalation flaw, dubbed “Zerologon,” to target…
  • "25% of BEC Cybercriminals Based in the US"
    The Agari Cyber Intelligence Division (ACID) published the results of a study on the operations of Business Email Compromise (BEC) attacks. These results give insight into the global footprint of BEC activity. Researchers looked at information on 9,000…
  • "Watchdog Urges More Action to Protect Planes from Hackers"
    The Government Accountability Office (GAO) calls on federal regulators to increase efforts toward strengthening the security of airliners' computer systems against hackers. The agency pointed out that the Federal Aviation Administration (FAA) has not…
  • "Hackers Chain Windows, VPN Bugs to Access Government Systems"
    Vulnerability chaining is a tactic in which multiple bugs are used to compromise a network or application. According to a joint statement released by CISA and the FBI, hackers have recently applied this tactic by exploiting a combination of Windows and…
  • "How Lack of Visibility Over IaaS Cloud Infrastructure Fuels Cyberattacks"
    The COVID-19 crisis has sped up the adoption of cloud technologies, further emphasizing the importance of strengthening cloud security. Although more businesses are adopting cloud technologies to protect their data and networks, their processes are weak…
  • "Microsoft And Partners Cut Off Key Trickbot Botnet Infrastructure"
    A coalition of tech companies headed by Microsoft has struck a serious blow against the adversaries behind the Trickbot botnet.  The researchers disrupted Trickbot through a court order they obtained and the technical action they executed in…
  • "Zero Trust Becoming Cyber Strategy of Choice Across Defense Department"
    Several agencies with the U.S. Department of Defense (DoD) are building a  zero-trust architecture. This architecture secures IT systems by treating all users as potential threats. All users must be authenticated, and their access must be authorized…
  • "Microsoft Warns of 'Continuously Evolving' Android Ransomware"
    Microsoft has identified a new strain of Android ransomware known as AndroidOS/MalLocker.B. According to Microsoft researchers, the authors of this malware have been continuously been updating it. The new variant applies various methods to circumvent the…
  • "C&C Panels of 10 IoT Botnets Compromised by Researchers"
    Two security researchers from SecNiche Security Labs were able to access the command and control (C&C) panels of Internet of Things (IoT) botnets, including Mana, Vivid, 911-Net, Purge Net, Goon, Kawaii, 0xSec. The compromise of IoT botnets' C&C…
  • "ATM Cash-Out: A Rising Threat Requiring Urgent Attention"
    The PCI Security Standards Council (PCI SSC) and the ATM Industry Association (ATMIA) have started to warn financial institutions of ATM cash-out attacks.   Adversaries usually insert malware via phishing or social engineering methods into a…
  • "Finding the Origins of a Hacker"
    Sarah Freeman is senior industrial control systems cybersecurity analyst at Idaho National Laboratory (INL) who looks at the different aspects of cyberthreats facing critical infrastructure. Attacks against pipelines, transportation networks, and other…