-
"Security Researchers Expose New Alexa and Google Home Vulnerability"Security researchers at SRLabs discovered a new vulnerability that impacts Amazon Alexa and Google Home. The exploitation of this vulnerability could allow hackers to secretly listen in on users and execute phishing attacks in which users are asked for…
-
"Prevention Better Than Cure at Keeping Young Users From Getting Involved in Cybercrime"A new study conducted by researchers from the University of Cambridge and the University of Strathclyde explored the different ways in which law enforcement attempts to prevent young people from engaging in cybercrime to see how effective these methods…
-
"Worm Hits Docker Containers"Palo Alto Network’s threat intelligence, Unit 42, has reported a crypto-jacking worm, called Graboid, that was found in images on Docker Hub. Researchers believe an attacker leveraged unsecured Docker daemons to deploy and spread the worm. Although…
-
"Security Researcher Publishes Proof-Of-Concept Code for Recent Android Zero-Day"Grant Hernandez, a PhD candidate at the Florida Institute of Cyber Security at the University of Florida, recently published proof-of-concept (PoC) code on GitHub for an Android zero-day vulnerability discovered by Google Project Zero security…
-
"Cryptography without Using Secret Keys"Researchers from the University of Twente and Einhoven University of Technology have developed a new method that secures data without using secret keys. The cryptographic keys used by most security applications must be kept confidential so that they do…
-
"Facebook’s Bug Bounty Gets Bigger for Third-Party Apps"In an effort to improve Facebook’s security and privacy, the social media giant will enhance its bug bounty programs by allowing security researchers to actively search for vulnerabilities in third-party apps and websites that integrate with its platform…
-
"New Cryptomining Malware Uses WAV Audio Files to Conceal Its Tracks"Security researchers from Cylance have discovered the use of a steganography technique in a new campaign aimed at distributing cryptomining malware. Steganography is a technique that can be used by hackers to covertly deliver malware in or by way of…
-
"Silent Librarian Retools Phishing Emails to Hook Student Credentials"The threat group known as Silent Librarian, TA407, or Cobalt Dickens, has been discovered to be using new tactics in an updated phishing campaign. Silent Librarian targets university students to steal student login credentials. According to researchers…
-
"A new Mac Malware Dubbed Tarmac has Been Distributed via Malvertising Campaigns"It has been discovered that malvertising campaigns are distributing MacOS malware combining both Shlayer and Tarmac malware. The malvertising campaigns have targeted users located in the US, Italy, and…
-
"FIN7 Gang Returns With New Malicious Tools"The financially-motivated hacking group, FIN7, is back with new malicious tools. FIN7 hackers are known for targeting businesses, including fast-food restaurants, hotels, and casinos for the purpose of stealing payment data such as credit card numbers.…
-
"Beyond Testing: The Human Element of Application Security"According to Veracode's recent State of Software Security (SOSS) report, the analysis of results from more than 700,000 applications scans revealed that 83 percent of the applications contained one or more vulnerabilities. These results call for the…
-
"Protecting Smart Machines From Smart Attacks"A team of researchers at Princeton University conducted studies on how adversaries can attack machine learning models. As the application of machine learning grows, it is important that we examine the different ways in which this technology can be…
News