News
-
"Attackers Can Exploit Critical Cisco Jabber Flaw With One Message"Researchers with Watchcom have discovered a critical remote code-execution (RCE) flaw in the Windows version of Cisco Jabber, a video-conferencing and instant messaging application. According to these researchers, the flaw could be exploited without the…
-
"Helping Companies Prioritize Their Cybersecurity Investments"One of the reasons as to why cyberattacks continue to grow in frequency and sophistication is because there is a lack of information shared about how these attacks occur. Companies that experience cybersecurity incidents often refrain from reporting them…
-
"Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication"A team of international scientists led by the University of Bristol has made a significant breakthrough in the field of quantum communication, bringing the world a step closer to having a quantum internet that could deliver impenetrable security for safe…
-
"Microsoft Strengthens Deepfake Fight With New Authentication Tools"Microsoft has launched new deepfake-fighting tools. Deepfakes are videos, photos, and audio recordings that have been generated through the use of Artificial Intelligence (AI). One tool analyzes photos or videos and then provides a percentage chance…
-
"Ransomware Attacks Demanding Larger Payouts from Local Governments"According to a report recently published by the cybersecurity firm BlueVoyant, hackers have increased the amount of money they demand from local governments in ransomware attacks. The average ransom demand has increased from $30,000 in 2017 to $380,000…
-
"Companies Continue to Expose Unsafe Network Services to the Internet"Research conducted by RiskRecon found that 33% of organizations involved in the digital supply chain expose one or more unsafe network services such as data storage, remote access, and network administration to the internet. This discovery was made from…
-
"Securing The Internet"Assistant Professor of Information Systems at Singapore Management University (SMU), Wang Qiuhong, explored the connections and interdependencies among Autonomous Systems (ASes), which are Internet Service Providers' (ISP) networks. One of this study's…
-
"Cyber-Criminals Mimicking Global Brand Domain Names to Launch Scams"According to a new study by Palo Alto Networks, cybercriminals are frequently impersonating global brands through the performance of cyber-squatting to execute phishing attacks and scams aimed at stealing credentials or money. Cyber-squatting refers to…
-
"Slack Patches Critical Desktop Vulnerability"A security engineer at Evolution Gaming discovered a critical remote-code execution (RCE) vulnerability in the popular Slack collaboration app, which has now been patched. The vulnerability could have allowed attackers to gain full remote control over…
-
"NCR Confirms Malware in Lab Environment, Says Clients Not at Risk"NCR Corporation, the popular point-of-sale and ATM software developer, has confirmed that computers in an isolated non-production lab have been infected with malware, potentially posing a supply-chain risk to customers. The malware was identified as…
-
"Apple's Automated Notarization Process Mistakenly Approved Mac Malware"Security researchers Patrick Wardle and Peter Dantini discovered that Apple's macOS app notarization process inadvertently approved Mac malware disguised as a Flash player. The notarization would result in the circumvention of Apple's built-in Gatekeeper…
-
"Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked"Researchers at CyberNews hacked 28,000 printers to highlight how easy it is to compromise them and the importance of improving security for such devices. They found that more than 800,000 printers could be accessed over the internet. Out of a sample…