News
-
"VMware Flaw Allows Takeover of Multiple Private Clouds"Researchers at a security pen-testing company called Citadelo found that VMware’s VMware Cloud Director has a security flaw that could be exploited to compromise multiple customer accounts using the same cloud infrastructure. The vulnerability was…
-
"Amtrak Breached, Some Customers’ Logins And PII Potentially Exposed"Amtrak, the national rail service for the US, has suffered a data breach. A third party got unauthorized access to some Amtrak Guest Rewards accounts on the evening of April 16. Researchers discovered that the adversary used compromised…
-
"This Bot Hunts Software Bugs for the Pentagon"ForAllSecure, a Carnegie Mellon University startup, developed a tool called Mayhem that examines software to find security flaws. The U.S. Air Force, Navy, and Army, as well as the internet infrastructure company Cloudflare uses Mayhem as a part of their…
-
"Users Rarely Change Passwords after a Breach – or They Choose a Weaker Password"A recent study conducted by Carnegie Mellon University's CyLab finds that users rarely change their passwords for accounts on breached domains. According to one researcher, only 13 percent of users changed their passwords within the first three months of…
-
"Hackers Sell 80K Stolen Credit Card Details on Dark Web"The cybersecurity research firm Cyble discovered a data leak involving details of more than 80,000 credit cards. Threat actors are selling this information on the dark web market in exchange for cryptocurrency. The dump of stolen credit card details…
-
"Enterprise Mobile Phishing Attacks Skyrocket Amidst Pandemic"Researchers discovered that the rate of mobile phishing rose sharply between the last quarter of 2019 and the first quarter of 2020. The encounter rates for enterprise mobile phishing increased 37 percent between the last quarter of 2019 and the…
-
"Most Chrome Security Bugs Rooted in Faulty Memory Code"Google researchers found that nearly three-quarters of all security bugs contained by the Chrome web browser derive from problems with memory coding. According to the researchers, the current methods of sandboxing and site isolation used to prevent…
-
"Security Remains a Major Concern For Enterprise IoT Integration"Researchers at Syniverse conducted a new survey of 200 enterprise executives in North America and Europe in several key vertical industries already using or in the process of deploying IoT. These industries include financial services, retail,…
-
"Evidence Suggests That the U.S. Loses Hundreds of Billions to Cybercrime"Cybercrime poses a threat to America's competitive advantage and the future of the economy. However, many still question the extent to which cybercrime impacts economic activity, claiming the compromise of and bias with cybercrime loss estimates. The…
-
"GitHub Uncovers Malicious ‘Octopus Scanner’ Targeting Developers"GitHub Security Labs has discovered a form of malware that spreads via infected repositories on their systems. The malware found is called Octopus Scanner. Octopus Scanner targets Apache NetBeans, which is an integrated development…
-
"New Technique Improves Effectiveness of Timing Channel Attacks"Researchers at the Indian Institute of Technology Kanpur have discovered a new technique called "DABANGG," which improves the effectiveness of timing channel attacks. A timing channel attack refers to the analysis of how long it takes for a targeted…
-
"Education App Reveals Users' Sensitive Information, Research Finds"Security researchers found that 8Belts, maker of language-learning apps, left a database containing sensitive information about hundreds of thousands of users exposed online. The unsecured 8Belts database, which has now been taken down, revealed national…