News
-
"Compliance Activities Cost Organizations $3.5 Million Annually"Researchers at Telos have discovered that organizations are struggling to keep up with IT security and privacy compliance regulations. Researchers at Telos surveyed 300 IT security professionals in July and August. The survey revealed that,…
-
"Fitbit Spyware Steals Personal Data via Watch Face"Using the Fitbit application API, Kev Breen, the director of cyber research for Immersive Labs, built a malicious Fitbit application. This app contains spyware that can steal user information such as gender, age, heart rate, and weight, as well as…
-
"Protecting Device Software from Zero-Day Attacks with TrustMS"The Department of Homeland Security (DHS) Science and Technology Directorate (S&T), in partnership with Intelligent Automation, Inc. (IAI), developed a new technology called the Trusted Mobile System (TrustMS). This cybersecurity tool secures device…
-
"Facebook Debuts Bug-Bounty ‘Loyalty Program’"Facebook is creating a loyalty program as part of its bug-bounty offering, hoping to incentivize researchers to find vulnerabilities in its platform. Facebook bounty hunters will be placed into tiers by analyzing their score, signal, and the number…
-
"Election Systems Under Attack via Microsoft Zerologon Exploits"The Cybersecurity Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that advanced persistent threat actors (APTs) are now leveraging Microsoft’s severe privilege-escalation flaw, dubbed “Zerologon,” to target…
-
"25% of BEC Cybercriminals Based in the US"The Agari Cyber Intelligence Division (ACID) published the results of a study on the operations of Business Email Compromise (BEC) attacks. These results give insight into the global footprint of BEC activity. Researchers looked at information on 9,000…
-
"Watchdog Urges More Action to Protect Planes from Hackers"The Government Accountability Office (GAO) calls on federal regulators to increase efforts toward strengthening the security of airliners' computer systems against hackers. The agency pointed out that the Federal Aviation Administration (FAA) has not…
-
"Hackers Chain Windows, VPN Bugs to Access Government Systems"Vulnerability chaining is a tactic in which multiple bugs are used to compromise a network or application. According to a joint statement released by CISA and the FBI, hackers have recently applied this tactic by exploiting a combination of Windows and…
-
"How Lack of Visibility Over IaaS Cloud Infrastructure Fuels Cyberattacks"The COVID-19 crisis has sped up the adoption of cloud technologies, further emphasizing the importance of strengthening cloud security. Although more businesses are adopting cloud technologies to protect their data and networks, their processes are weak…
-
"Microsoft And Partners Cut Off Key Trickbot Botnet Infrastructure"A coalition of tech companies headed by Microsoft has struck a serious blow against the adversaries behind the Trickbot botnet. The researchers disrupted Trickbot through a court order they obtained and the technical action they executed in…
-
"Zero Trust Becoming Cyber Strategy of Choice Across Defense Department"Several agencies with the U.S. Department of Defense (DoD) are building a zero-trust architecture. This architecture secures IT systems by treating all users as potential threats. All users must be authenticated, and their access must be authorized…
-
"Microsoft Warns of 'Continuously Evolving' Android Ransomware"Microsoft has identified a new strain of Android ransomware known as AndroidOS/MalLocker.B. According to Microsoft researchers, the authors of this malware have been continuously been updating it. The new variant applies various methods to circumvent the…