News
-
"Hackers Use Cloud Monitoring Tool to Install Cryptominers"Reports from Microsoft and Intezer reveal the weaponization of a legitimate cloud monitoring tool, called Weave Scope, to install cryptominers in cloud environments. TeamTNT is the hacking group discovered to be using the tool to perform this malicious…
-
"Third-Party Components Putting Operational Hardware and Software Technologies at Risk"Six critical vulnerabilities have been discovered by Claroty researchers in a third-party software component used by top Industrial Control System (ICS) software vendors such as Rockwell Automation and Siemens. These vulnerabilities were found in Wibu-…
-
"COVID-19 Sites Plagued with Third-Party Tracking, Posing Privacy Risk"According to a new study published in JAMA, almost all websites designed to provide information to people regarding COVID-19 symptoms, testing, and prevention contain code that transfers data to third parties, posing a threat to users' privacy.…
-
"Digital Point's Unsecured Database Exposed Records of Over 800,000 Users"An Elasticsearch database belonging to Digital Point, the world's largest webmaster forum and marketplace for web services, was discovered to be left online without password protection. The unprotected database contained more than 62 million records…
-
"Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban"Researchers have discovered a malicious app called TikTok Pro. Threat actors are urging users via SMS and Whatsapp messages to download the latest version of Tiktok from a specific web address. The fake TikTok Pro app contains malware that…
-
"More IT Security in Port Terminals"Ports are critical infrastructures and require improved security, as attacks resulting in disruptions could significantly impact the economy. Digitalized container terminal operations, in particular, face various potential security risks. The movement of…
-
Popular Android Apps Are Rife With Cryptographic Vulnerabilities"Researchers at Columbia University have recently released Crylogger, an open source dynamic analysis tool that shows which Android apps contain cryptographic vulnerabilities. The researchers used the tool to test 1780 popular Android apps from the…
-
"Verizon Engineers Work to Secure the 5G Network"Verizon recently released details about its efforts to secure the 5G network. According to Verizon, its network security engineers are developing an Artificial Intelligence (AI) and Machine Learning (ML) security framework to detect security anomalies…
-
"Post-COVID-19 Cybersecurity Spending Update"Earlier reports have suggested that the uncertainty of the COVID-19 pandemic interrupted security budgets and spending. Organizations have held back on spending while they gain a more in-depth insight into the economic environment, as indicated by…
-
"Facebook Announces New Details on How It Will Disclose Bugs Found in Third-Party Products"Facebook has announced its first formal policy that addresses how it will disclose vulnerabilities found in third-party products by security researchers. This policy also covers how long Facebook will give the third-parties to respond, fix, and…
-
"Lockdown Sees Increase in Girls Applying for GCHQ Cyber Courses"According to the Government Communications Headquarters (GCHQ), a British intelligence agency, there has been a significant increase in the number of young people, especially girls, applying for online cybersecurity skills courses offered by its…
-
"CISA Pushes Vulnerability Disclosure Policies"The U.S. Homeland Security Department's Cybersecurity & Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD) ordering federal executive branch departments and agencies to develop and publish vulnerability disclosure…