News
-
"Bad RCS Implementations Are Creating Big Vulnerabilities"There are multiple vulnerabilities associated with how the new messaging standard aimed at replacing SMS (Short Message Service) is being implemented by carriers. In some instances, carriers' implementation of the communication protocol, RCS (Rich…
-
"Need to Safeguard Drones and Robotic Cars Against Cyber Attacks"Researchers at the University of British Columbia (UBC) demonstrated three different covert attacks on robotic vehicles, suggesting the vulnerability of robotic vehicles such as Amazon delivery drones or Mars rovers to getting hacked. The attacks…
-
"CISA Wants a Vulnerability Disclosure Program At Every Agency"The U.S. Homeland Security Department's Cybersecurity & Infrastructure Security Agency (CISA) wants a vulnerability disclosure policy in place for every federal agency. Each federal agency would be required to create a formal process for security…
-
"This Tool Predicts Cybercriminal Activity Even Before It Happens"Group-IB, a Singapore-based cybersecurity company, developed a new tool that can help analysts in security operations centers and computer emergency response teams predict cyberattacks before they occur. The tool is also available to threat intelligence…
-
"Should Cybersecurity be Taught in Schools?"Human behavior is one of the biggest threats when it comes to cybersecurity. The education system teaches children not only with elementary competencies but also equips them with at least some of the skills that they’ll need to navigate their daily lives…
-
"APT33 Has Shifted Targeting to Industrial Control Systems Software, Microsoft Says"The Iranian government-linked hacking group, known as APT33, has shifted targets in that the group is now going after industrial control systems (ICS) instead of just probing IT networks. APT33 was previously known to have targeted defense,…
-
"Most Organizations Have Incomplete Vulnerability Information"According to a new report released by Risk Based Security, if a company only uses the Common Vulnerabilities and Exposures (CVE) system or National Vulnerability Database (NVD) to gain insight into vulnerabilities, they are vulnerable to a significant…
-
"Attackers Demand $14 Million Ransom From IT Services Firm"On November 17th Virtual Care Provider Inc., which provides cloud hosting and other services to more than 110 healthcare entities, including nursing homes and assisted living facilities, had been affected by ransomware. The type of ransomware that was…
-
"PoS Malware Exposes Customer Data of Catch Restaurants"Point-of-sale (PoS) systems used at popular NYC restaurants, including Catch NYC, Catch Roof and Catch Steak were found to contain malware that could allow attackers to search for track data read by PoS devices from payment cards. The data includes…
-
"Cyberattack Hit 10% of Louisiana's State Government Servers"Neal Underwood, Louisiana's deputy chief information officer, recently discussed the ransomware attack that impacted 10% of computer network servers used by the Louisiana state government to conduct operations. Although the ransomware attack did not…
-
"A Model to Classify Cyberattacks Using Swarm Intelligence"A team of researchers at Glasgow Caledonian University and COMSATS University in Pakistan developed a new intrusion detection scheme to improve the security of information shared via the internet. The proposed scheme is based on the Artificial Bee Colony…
-
"Cyberattackers Taking Auto Industry for a Ride, FBI Reportedly Warns"The FBI issued an alert to a select group of companies in the U.S. auto industry about the exploitation of network vulnerabilities as well as the execution of brute force attacks and phishing attacks to gain access into their networks. According to the…