News
-
"Worldwide New Account Fraud Declined 23.2% in 2020"In a new study by researchers at Jumio, the researchers examined fraudulent attempts to open a new account using a manipulated government-issued ID and a corroborating selfie. Selfie-based fraud describes fraudulent attempts to use a picture or video (e.…
-
"Script for Detecting Vulnerable TCP/IP Stacks Released"The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released a new advisory about four newly discovered vulnerabilities impacting the Treck TCP/IP stack. These vulnerabilities affect Treck TCP/IP stack version 6.0.1.67 and older…
-
"Institute for Security and Technology Launches Multisector Ransomware Task Force"The Institute for Security and Technology (IST) has launched a multisector task force aimed at developing solutions for combating ransomware attacks. The Ransomware Task Force (RTF) will involve cybersecurity firms, cybersecurity threat sharing groups,…
-
"“Is It You In The Video?” – Don’t Fall For This Messenger Scam"Researchers have discovered a new phishing attempt that is using Facebook Messenger. Adversaries use people's social media accounts to send "a video" to the user's friends. The adversaries then ask, "is it you in this video". There is no…
-
"Ransomware Gangs Use 'SystemBC' Tor Backdoor in Attacks"Sophos researchers have reported the use of a backdoor named SystemBC by multiple ransomware families, including Ryuk and Egregor. The continuously evolving backdoor executes commands and enables adversaries to download and run scripts, executables, and…
-
"CyberMDX Research Team Discovers Critical Vulnerabilities in Dell Wyse Thin Client Devices"Researchers at the healthcare cybersecurity provider CyberMDX discovered critical vulnerabilities in Dell Wyse Thin Client devices. The exploitation of these vulnerabilities could allow attackers to remotely run malicious code and access arbitrary files…
-
"5G Standalone Networks May Have More Vulnerabilities Than You Think"Positive Technologies released a new report titled "5G Standalone Core Security Research," highlighting several potential vulnerabilities in 5G standalone networks that could lead to Denial-of-Service (DoS) attacks. Researchers conducted network…
-
"Bouncy Castle Bug Puts Bcrypt Passwords at Risk"Synopsys researchers discovered a severe authentication bypass vulnerability in a popular Java cryptography library called Bouncy Castle. The vulnerability exists in the OpenBSDBcrypt class of Bouncy Castle. The exploitation of this vulnerability could…
-
"5M WordPress Sites Running ‘Contact Form 7’ Plugin Open to Attack"Researchers at Astra Security found a critical bug for the popular WordPress plugin called Contact Form 7. The critical bug allows an unauthenticated adversary to take over a website running the plugin or hijack the entire server hosting the…
-
"K-12 Schools Need to Take Cyberattacks More Seriously"There has been a significant increase in cyberattacks against public schools in the United States since the beginning of the 2020-21 school year. Federal cybersecurity officials expect these attacks to continue growing in frequency and sophistication.…
-
"Hackers Use Mobile Emulators to Steal Millions"IBM Trusteer researchers report that hackers are using mobile emulators to spoof banking customers' mobile devices in order to steal millions of dollars from online banking accounts belonging to customers located in the U.S. and Europe. Mobile emulators…
-
"Migration Delays Prevent AD-Centric Zero Trust Security Framework Adoption"Researchers at One Identity conducted a new survey of 1,216 IT security professionals. They found that 37 percent of the participants rated rapid changes in their AD/AAD environment as the key impact of COVID-19 on their organization’s identity…