News
  • "Microsoft Strengthens Deepfake Fight With New Authentication Tools"
    Microsoft has launched new deepfake-fighting tools. Deepfakes are videos, photos, and audio recordings that have been generated through the use of Artificial Intelligence (AI). One tool analyzes photos or videos and then provides a percentage chance…
  • "Ransomware Attacks Demanding Larger Payouts from Local Governments"
    According to a report recently published by the cybersecurity firm BlueVoyant, hackers have increased the amount of money they demand from local governments in ransomware attacks. The average ransom demand has increased from $30,000 in 2017 to $380,000…
  • "Companies Continue to Expose Unsafe Network Services to the Internet"
    Research conducted by RiskRecon found that 33% of organizations involved in the digital supply chain expose one or more unsafe network services such as data storage, remote access, and network administration to the internet. This discovery was made from…
  • "Securing The Internet"
    Assistant Professor of Information Systems at Singapore Management University (SMU), Wang Qiuhong, explored the connections and interdependencies among Autonomous Systems (ASes), which are Internet Service Providers' (ISP) networks. One of this study's…
  • "Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams"
    According to a new study by Palo Alto Networks, cybercriminals are frequently impersonating global brands through the performance of cyber-squatting to execute phishing attacks and scams aimed at stealing credentials or money. Cyber-squatting refers to…
  • "Slack Patches Critical Desktop Vulnerability"
    A security engineer at Evolution Gaming discovered a critical remote-code execution (RCE) vulnerability in the popular Slack collaboration app, which has now been patched. The vulnerability could have allowed attackers to gain full remote control over…
  • "NCR Confirms Malware in Lab Environment, Says Clients Not at Risk"
    NCR Corporation, the popular point-of-sale and ATM software developer, has confirmed that computers in an isolated non-production lab have been infected with malware, potentially posing a supply-chain risk to customers. The malware was identified as…
  • "Apple's Automated Notarization Process Mistakenly Approved Mac Malware"
    Security researchers Patrick Wardle and Peter Dantini discovered that Apple's macOS app notarization process inadvertently approved Mac malware disguised as a Flash player. The notarization would result in the circumvention of Apple's built-in Gatekeeper…
  • "Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked"
    Researchers at CyberNews hacked 28,000 printers to highlight how easy it is to compromise them and the importance of improving security for such devices. They found that more than 800,000 printers could be accessed over the internet. Out of a sample…
  • "Research Finds Increase in Botnet and Exploit Activity in Q2 2020"
    Nuspire released a new report on cybercriminal activities, tactics, techniques, and procedures observed in the second quarter of 2020. According to the report, new challenges for security administrators are continuing to emerge as organizations settle…
  • "Credential Theft Via Spoofed Login Pages Increase, Healthcare Top Target"
    According to a new report from IRONSACLES, there has been a significant increase in successful credential theft attempts via spoofed login pages and social engineering attacks in the first half of the year, most of which targeted those working in the…
  • "Browsing Histories Can Be Used to Track Users"
    A study conducted by Mozilla researchers has confirmed that browsing histories can be employed to track users by compiling unique browsing profiles. They collected browsing data from 52,000 Firefox users for two weeks. The examination of the…