News
-
"FritzFrog Botnet Attacks Millions of SSH Servers"Researchers at Guardicore Labs have discovered a peer-to-peer (P2) botnet called FritzFrog, which has been actively breaching SSH servers since January. SSH servers are pieces of software found in routers, IoT devices, and other machines. SSH…
-
"Remote Exploit Flaw Found in Millions of Connected IoT Devices"IBM X-Force Red security researchers found a security flaw in components manufactured by Thales, which are included in millions of Internet of Things (IoT) devices. Thales produces components for over 3 billion devices used by 30,000 companies in…
-
"What is The Cost of a Data Breach?"Researchers at IBM conducted an annual study that found that customer data was the most-commonly compromised type of record during a data breach. The average cost per lost or stolen record was $146 across all data breaches. The researchers also…
-
"Apple's Attest API Tool Aims to Tighten App Security"Apple has released a new tool aimed at helping developers protect iOS apps against security threats. Apple's Attest API tool generates a cryptographic key on a user's device to ensure that an app is authentic. The tool also makes sure that a phone…
-
"RedCurl Cybercrime Group Has Hacked Companies for Three Years"Researchers at the security firm Group-IB have discovered a Russian-speaking hacking group, dubbed RedCurl. According to the researchers, RedCurl has focussed on corporate espionage and launched 26 campaigns against 14 organizations since 2018. RedCurl…
-
"Thousands of Taiwan Government Email Accounts 'Hacked by China'"Chinese hackers have infiltrated at least 10 Taiwan government agencies and gained access to about 6,000 email accounts in an attempt to steal data. According to a top Taiwan cyber official, the damage done is not small, and the full impact is still…
-
"Apache Struts Vulnerabilities Allow Remote Code Execution, DoS"The Apache Software Foundation has released security advisories about vulnerabilities discovered in Apache Struts versions 2.0.0 through 2.5.20 that have the potential to help launch remote code-execution (RCE) and denial-of-service (DoS…
-
"UCI Cyber-Physical Security Researchers Highlight Vulnerability of Solar Inverters"Cyber-physical systems security researchers at the University of California demonstrated the use of inexpensive equipment to attack a grid-tied solar inverter. The researchers built a remote spoofing device composed of an electromagnet, an Arduino…
-
"Researchers Warn of Active Malware Campaign Using HTML Smuggling"Security researchers at a company called Menlo Security, have uncovered an active malware campaign that utilizes HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies, and…
-
"The Attack That Broke Twitter Is Hitting Dozens of Companies"Hackers used a social engineering technique called "phone spear phishing," also known as "vishing" or "voice phishing," in an attempt to compromise more than 100 Twitter accounts belonging to high-profile users, including CEOs, celebrities, and…
-
"Publicly Reported Data Breaches Down 52%, Exposed Records Way Up!"Researchers at Risk Based Security have discovered that the number of publicly reported data breaches is at its lowest in five years. However, the number of records exposed is more than four times higher than any previously reported time period.…
-
"Crypto-Mining Worm Steal AWS Credentials"Security researchers have discovered cryptocurrency mining malware capable of stealing AWS credentials from infected servers. The malware was observed being used by TeamTNT, a cybercrime group that targets Docker installations. According to researchers,…