News
  • "Latest Tax Scams Target Apps and Tax-Prep Websites"
    Researchers at Proofpoint found that since it is tax season, the number of e-mail based scams are increasing. One, in particular, uses the legitimate app TeamViewer to take over victims’ systems.  Other email-based attacks this year leverage more…
  • "US Gas Pipeline Shut Down Due to Ransomware"
    A US gas pipeline operator has been hit with ransomware, encrypting data on its information technology (IT) and operational technology (OT) networks. The ransomware impacted human-machine interfaces (HMIs), data historians, and polling servers. As a…
  • "Cyber Researchers at Ben-Gurion University Fool Autonomous Vehicle Systems With Phantom Images"
    Researchers at Ben-Gurion University of the Negev's (BGU) Cyber Security Research Center projected "phantom" images on the road and a digital billboard to fool the autopilot of an autonomous vehicle into applying its brakes, following fake traffic signs…
  • "Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs"
    Researchers from Eclypsium, have discovered new firmware vulnerabilities in Wi-Fi adapters, USB hubs, trackpads, and cameras that are putting millions of peripheral devices in danger of a range of cyberattacks.  Most of the vulnerabilities found are…
  • "Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs"
    The firmware security company, Eclypsium, recently released a report that emphasizes the importance of creating secure mechanisms for updating a device's firmware. The companies that make hardware components such as Wi-Fi adapters, USB hubs, trackpads,…
  • "5G Networks Present New Risks and Security Challenges"
    The 5G mobile communication standard will bring improvements regarding speed, latency, and network capacity. However, as with any other new technology, 5G networks are expected to be abused by threat actors. The potential security vulnerabilities…
  • "Google Removes 500+ Malicious Chrome Extensions From the Web Store"
    More than 500 malicious Chrome extensions were recently removed from Google's Web Store. An investigation conducted by security researcher Jamila Kaya and Cisco's Duo security found that the extensions injected malicious ads (malvertising) in millions of…
  • "Plastic Surgery Patient Photos, Info Exposed by Leaky Database"
    Due to the improper security of an Amazon Web Services (AWS) S3 bucket, approximately 900,000 documents were leaked from NextMotion, a France-based technology company that provides imaging and patient management services for 170 plastic surgery clinics…
  • "Researchers Design a Tool to Identify the Source of Errors Caused by Software Updates"
    Software updates intend to make applications run faster or more smoothly, however, sometimes software updates can have bugs known as performance regressions, which can make the software run slower or less smoothly. Usually, it takes a lot of time to fix…
  • "New Cryptography Method Promising Perfect Secrecy Is Met With Skepticism"
    A team of researchers from King Abdullah University of Science and Technology, the University of St. Andrews, and the Center for Unconventional Processes of Sciences claims to have demonstrated a "perfect secrecy cryptography system" that is resistant to…
  • "Mac Malware Threats Are Now Outpacing Attacks on Windows PCs"
    Researchers that work for a cybersecurity company Malwarebytes analyzed a year of data on cyberattacks their customers were affected with and found that malicious activity and malware attacks targeting Macs rose significantly over the past year.  In…
  • "Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems"
    A formal risk framework aimed at improving the development of secure machine learning (ML) systems has been developed by researchers at the Berryville Institute of Machine Learning (BIML). The BIML researchers conducted an architectural risk analysis of…