News
-
"Ransomware Reminder: Paying Ransoms Doesn't Pay"Researchers have conducted a new survey of 5,000 IT professionals across 25 countries. 51 percent of the participants said that their organizations experienced a "significant" ransomware attack in the last 12 months, of which 73 percent resulted in…
-
"Enhancing Privacy Protections for Android Applications"A platform, called Privacy Enhancements for Android (PE for Android), has been developed by a team of researchers led by Two Six Labs and Raytheon BBN Technologies under DARPA's Brandeis program. PE for Android was developed to support the creation of a…
-
"Software Developed by SMU Stops Ransomware Attacks"Engineers from Southern Methodist University's (SMU) Darwin Deason Institute for Cybersecurity have developed new software to detect ransomware attacks. SMU's software differs from existing methods, such as antivirus software or other intrusion detection…
-
"How Two Researchers Used an App Store to Demonstrate Hacks on a Factory"A malware attack experienced by the German car parts manufacturer Rheinmetall Automotive resulted in the disruption of production at the company's plants that cost an estimate of $4 million per week. The incident brought further attention to the…
-
"Healthcare Giant Magellan Struck with Ransomware, Data Breach"Magellan Health has recently discovered that it has suffered a data breach. An unauthorized adversary gained access to Magellan's systems after sending a phishing email on April 6th. The adversaries sent the phishing email impersonating as a…
-
"REvil Ransomware Attack Hits A-List Celeb Law Firm"A popular law firm that works with several A-List Celebrities, including Madonna, Lady Gaga, and Drake, has been hit with a REvil ransomware attack. The adversaries were able to steal 756 gigabytes worth of data, including client contracts,…
-
"Microsoft and Intel Project Converts Malware Into Images Before Analyzing It"Microsoft researchers are working with Intel Labs on a project, called STAMINA (Static Malware-as-Image Network Analysis). The project explores a new approach to detecting and classifying malware that involves the application of deep learning techniques…
-
"Researchers Find Bitcoin’s Lightning Network Susceptible to Cyberattacks"Bitcoin is a cryptocurrency that is not centrally managed or facilitated by banks or other financial institutions. According to researchers at Florida International University, the Lightning Network originally designed to increase the speed and…
-
"Astaroth Trojan Employed YouTube Channels as C&C to Evade Detection"Cisco Talos discovered a new variant of the Astaroth Trojan family that applies evasion checks and anti-analysis processes through the use of YouTube channels as its command-and-control (C&C) infrastructure. The new Astaroth attack campaign primarily…
-
"Anubis Malware Upgrade Logs When Victims Look at Their Screens"Security researchers at Hold Security discovered that threat actors are coming up with new features for the sophisticated banking trojan that targets Google Android devices and apps called Anubis Malware. The security researchers discovered a…
-
"Strained Health Systems Struggle to Keep up With Hackers"The Intelligence and National Security published a new study conducted by a multi-disciplinary team of researchers at the University of New South Wales that brings further attention to the importance of developing training programs and enforcing stricter…
-
"Survey Suggests Businesses are Overconfident About Their Security During COVID-19"Findings from a global survey recently released by Crowdstrike show that cybersecurity officials and business decision-makers are overconfident about their security during the COVID-19 pandemic. CrowdStrike's Work Security Index, based on a survey of…