News
-
"New Mirai Variant Exploits NAS Device Vulnerability"A new variant of the infamous Mirai IoT botnet, called Mukashi, is exploiting vulnerabilities contained by Zyxel network-attached storage (NAS) devices to execute distributed denial-of-service (DoS) attacks. The flaw exploited by the Mukashi botnet is…
-
"Widely Available ICS Attack Tools Lower the Barrier for Attackers"As the number of publicly available ICS-specific intrusion and attack tools increases, the possibility of successful attacks against ICS grows. FireEye researchers have pointed out that specialized skills are often needed to execute attacks against such…
-
"Google's Security Measures Failed to Find Android Malware in Play Store"Google has recently introduced many new security measures to prevent malicious apps from appearing on the Play Store. After these measures were put into place, researchers from Check Point found malware lurking within 56 apps that had been…
-
"Pwn2Own Hackers Go Remote, Then Crack macOS and Oracle Machines Anyway"Pwn2Own is a hacking contest in which ethical hackers can earn rewards for discovering vulnerabilities in different programs. Global technology firms are now using the competition as a way to recruit bug hunters who can help improve the security of their…
-
CMU is the NSA Featured School of the QuarterEach quarter, The National Security Agency recognizes the agency's engagement with an academic institution. This quarter, the school is Carnegie Mellon University in Pittsburgh, PA. CMU has many relationships with the NSA including hosting an SoS Lablet…
-
"Data Privacy and Security in the Travel Industry"The COVID-19 outbreak has had a significant impact on the travel industry, temporarily forcing operations to shut down. The cruise, airline, and hotel sectors could take this time to examine and improve the privacy and security of the personally…
-
"Vulnerability Exposed Tesla Central Touchscreen to DoS Attacks"Researchers have discovered a flaw in Tesla Model 3's web interface. Tesla Model 3's web interface has a denial of service (DoS) vulnerability. To exploit the vulnerability, a user would have to go to a malicious webpage. If the user…
-
"Process Injection Tops Attacker Techniques for 2019"Red Canary's "2020 Threat Detection Report" highlights findings from the analysis of 15,000 confirmed threats that appeared in customer environments from the past year. Researchers' findings shared in the report give insight into the most common attack…
-
"Healthcare Cybersecurity in the Time of Coronavirus"Despite the COVID-19 crisis, hackers are still not holding back on attacking healthcare organizations. Brno University Hospital in the city of Brno, Czech Republic, faced a cyberattack that resulted in postponed surgeries and the redirection of some…
-
"'Dirty Little Secret' Extortion Email Threatens to Give Your Family Coronavirus"Researchers have discovered an extortion email where adversaries are sending threatening emails to people demanding 4,000 dollars. In the email, the adversaries say that if the money is not sent to them, then they will infect the individual's…
-
"NIST, DHS Publish Guidance on Securing Virtual Meetings, VPNs"The National Institute of Standards and Technology (NIST) and the Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Agency (CISA) are offering recommendations to organizations on how to conduct virtual meetings securely. They are…
-
"SANS Offers Free Kit to Secure Home Workers"The SANS Institute is offering a training kit and additional resources aimed at providing knowledge for organizations, parents, and individuals on how to protect themselves against cyber threats when working from home during the COVID-19 outbreak. The…