News
-
"How the International Space Station Enables Cybersecurity"Former NASA astronaut Pamela Melroy gave a presentation at the Aerospace Village within the DEFCON virtual security conference. She discussed cybersecurity lessons learned from human spaceflight and what cyber risks are faced by the International Space…
-
"Hackers Exploit Covid-19 Vaccine Interest As Cover For Attacks"Researchers at Check Point discovered that phishing emails with subject lines related to COVID-19 vaccines are now being used to trick recipients into downloading malicious files typically in file type forms of .exe, .xls, or .doc. The researchers…
-
"Why Organizations Push Vulnerable Code in Their Application Security Program"A new report from Synopsys, titled "Modern Application Development Security," reveals that 48% of organizations intentionally push vulnerable code in their application security programs. According to the report, organizations push vulnerable code because…
-
"Securing Human Resources From Cyber Attack"CISOs need to make protecting HR data a high priority during the Covid-19 pandemic. Since most employees are working from home, companies are even more susceptible to data breaches. If compromised, the data stored by HR can do a devastating…
-
"Baking and Boiling Botnets Could Drive Energy Market Swings and Damage"A study conducted by researchers at the Georgia Institute of Technology suggests that botnets made up of electric ovens, hot-water heaters, electric vehicle chargers, air-conditioners, and other internet-connected high-wattage appliances, could be used…
-
"Researchers Find More Devices, Vendors Vulnerable to Ripple20"In June, JSOF researchers disclosed a set of 19 vulnerabilities, dubbed "Ripple20," that affect millions of connected devices, including those used in the healthcare industry. These vulnerabilities were found in Treck's widely adopted low-level TCP/IP…
-
"Qualcomm Bugs Open 40 Percent of Android Handsets to Attack"Researchers have found six serious bugs in Qualcomm’s Snapdragon mobile chipset. The six bugs impact up to 40 percent of Android phones in use. The flaws open up handsets made by Google, Samsung, LG, Xiaomi, and OnePlus to DoS and escalation-…
-
"Over 30 Vulnerabilities Discovered Across 20 CMS Products"Researchers from Micro Focus Fortify have discovered more than 30 vulnerabilities in Microsoft SharePoint, Atlassian Confluence, and 18 other popular Content Management Systems (CMSs). CMSs enable the creation and modification of digital content for web…
-
"6,600 Organizations Bombarded With 100,000+ BEC Attacks"Researchers at Barracuda Networks have discovered that cybercriminals are increasingly registering accounts with legitimate services, such as Gmail and AOL, to use them in impersonation and BEC attacks. Barracuda researchers observed that 6,170…
-
"Security Bugs Let These Car Hackers Remotely Control a Mercedes-Benz"The car security research team from Qihoo 360, called the Sky-Go Team, discovered over a dozen vulnerabilities in a Mercedes-Benz E-Class car by reverse-engineering the car's components using a testbench they built. According to the researchers,…
-
"Beyond KrØØk: Even More Wi‑Fi Chips Vulnerable to Eavesdropping"Researchers have discovered a new vulnerability they are calling KrØØk (formally CVE-2019-15126). KrØØk is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. Specifically, the bug…
-
"How Hackers Could Spy on Satellite Internet Traffic With Just $300 of Home TV Equipment"A researcher at Oxford University demonstrated the potential exploitation of vulnerabilities in satellite broadband communications to intercept unencrypted web traffic through the use of an inexpensive satellite dish and a digital broadcasting satellite…