News
  • "New Cybersecurity Bills Promote CISOs and Privacy"
    Two new cybersecurity bills, the Cybersecurity Disclosure Act of 2019 and the Mind Your Own Business Act (MYOB) of 2019, are expected to change the U.S. cybersecurity landscape if they become laws. The Cybersecurity Disclosure Act of 2019, proposed by…
  • "Stripe Targeted by Phishing Campaign"
    There has been a new phishing campaign discovered, targeting a global online payment system called Stripe.  The adversaries performed the attack using an email, which resembles an official Stripe email, and sent the email…
  • "New Research Center Aims to Make Electronics More Secure"
    The Center for Hardware and Embedded Systems Security and Trust is the National Science Foundation's new research center aimed at protecting electronics and networked systems from being hacked, damaged, and spied on, which will be led by the University…
  • "Preventing Cyber Security Attacks Lies in Strategic, Third-Party Investments"
    Findings of a study conducted by Jay Simon and Ayman Omar at the American University's Kogod School of Business suggest that companies are more likely to underinvest in cybersecurity measures when they experience a data breach caused by a third-…
  • "Microsoft Launches Election Security Bug Bounty Program"
    Microsoft launched a bug bounty program for its open-source election software, called ElectionGuard, which is intended to improve the security, transparency, and accessibility of voting. The ElectionGuard is available as a software development kit (SDK…
  • "Security Researchers Expose New Alexa and Google Home Vulnerability"
    Security researchers at SRLabs discovered a new vulnerability that impacts Amazon Alexa and Google Home. The exploitation of this vulnerability could allow hackers to secretly listen in on users and execute phishing attacks in which users are asked for…
  • "Prevention Better Than Cure at Keeping Young Users From Getting Involved in Cybercrime"
    A new study conducted by researchers from the University of Cambridge and the University of Strathclyde explored the different ways in which law enforcement attempts to prevent young people from engaging in cybercrime to see how effective these methods…
  • "Worm Hits Docker Containers"
    Palo Alto Network’s threat intelligence, Unit 42, has reported a crypto-jacking worm, called Graboid, that was found in images on Docker Hub. Researchers believe an attacker leveraged unsecured Docker daemons to deploy and spread the worm. Although…
  • "Security Researcher Publishes Proof-Of-Concept Code for Recent Android Zero-Day"
    Grant Hernandez, a PhD candidate at the Florida Institute of Cyber Security at the University of Florida, recently published proof-of-concept (PoC) code on GitHub for an Android zero-day vulnerability discovered by Google Project Zero security…
  • "Cryptography without Using Secret Keys"
    Researchers from the University of Twente and Einhoven University of Technology have developed a new method that secures data without using secret keys. The cryptographic keys used by most security applications must be kept confidential so that they do…
  • "Facebook’s Bug Bounty Gets Bigger for Third-Party Apps"
    In an effort to improve Facebook’s security and privacy, the social media giant will enhance its bug bounty programs by allowing security researchers to actively search for vulnerabilities in third-party apps and websites that integrate with its platform…
  • "New Cryptomining Malware Uses WAV Audio Files to Conceal Its Tracks"
    Security researchers from Cylance have discovered the use of a steganography technique in a new campaign aimed at distributing cryptomining malware. Steganography is a technique that can be used by hackers to covertly deliver malware in or by way of…