News
-
"Australian and European Police Shut Down Access to Popular Criminal Hacking Tool"A widely-used remote-access hacking tool, called the Imminent Monitor Remote Access Trojan (IM-RAT), was recently taken down by Australian and European law enforcement. The tool had been sold to a little over 14,000 buyers in 124 countries via the…
-
"Microsoft Demystifies Email Attack Campaigns Targeting Organizations"Using email is the preferred method for adversaries to gain a foothold into organizations. A new tool is now available to some Microsoft enterprise customers called Campaign Views. This new tool allows security teams to see how successful…
-
"A Quantum Computing Future Is Unlikely, Due to Random Hardware Errors"Google announced that it had achieved quantum supremacy by performing a specific quantum computation at a greater speed than the best classical computers. IBM contested Google's claim of quantum supremacy, expressing that it had already made this…
-
"Linux Bug Opens Most VPNs to Hijacking"Security researchers at the University of New Mexico and Breakpointing Bad discovered a vulnerability that is contained by most Linux distributions. The researchers used a proof-of-concept exploit that allowed them to determine whether a user is…
-
"Compromised Passwords Used on 44 Million Microsoft Accounts"In a news study, Microsoft has found that 44 million Microsoft Azure AD and Microsoft Services accounts are vulnerable to account hijacking due to users using compromised passwords. Microsoft forced users to change their passwords if they found that the…
-
"Honeypots: Best Bet for IoT Security?"The electronics manufacturer, Panasonic, recently discussed how it improved the security of its Internet of Things (IoT) devices. The company is using specially crafted honeypot sites to trick cybercriminals into executing attacks against what appear to…
-
"Fingerprint Login Should Be a Secure Defense for Our Data, But Most of Us Don't Use It Properly"The implementation of biometrics-based security in Apple's iOS such as fingerprint authentication is supposed to add an extra layer to the protection of users' sensitive information. However, this feature is still being improperly used by most people. A…
-
"Cookie Leak Allows White-Hat Researcher to Access HackerOne Vulnerability Reports"HackerOne, a company that hosts bug bounty programs for organizations, recently disclosed an incident in which a human error led to the access of company vulnerability reports by a white-hat hacker known as haxta4ok00. One of HackerOne's security…
-
"New Ransomware Attacks Target Your NAS Devices, Backup Storage"Security researchers have observed an increase in ransomware attacks targeting network-attached storage (NAS) and backup storage devices. Ransomware continues to be a major threat to enterprises, hospitals, and utilities. NAS systems are devices…
-
"Hackers Find Ways Around a Years-Old Microsoft Outlook Fix"Email remains a weakness in security as highlighted by the ongoing exploitation of a flaw in Microsoft Outlook that was disclosed and patched in October 2017. The U.S. Cyber Command issued a warning about the exploitation of the vulnerability in…
-
"Web Payment Card Skimmers Add Anti-Forensics Capabilities"Researchers from Visa's Payment Fraud Disruption (PFD) team have found a new JavaScript-based payment card skimmer, dubbed Pipka, which has affected 16 e-commerce websites. Web skimming refers to the injection of malicious scripts into online merchant…
-
"FBI Issues Smart TV Cybersecurity Warning"The FBI recently issued a warning to consumers about the threat posed by unsecured smart TVs to their security and privacy. According to a statement released by the Oregon branch of the FBI, cybercriminals can abuse an inadequately secured TV connected…