News
  • "Report: Healthcare Is No. 1 - For Breaches"
    Healthcare organizations are ranked number one when it comes to being affected by breaches.  Once an attacker gained access to a device or an account, the most common next steps were accessing an Office 365 account (34 percent); roaming the network…
  • "The Cybersecurity Workforce Shortage Is a Big Problem. You Can Help Girl Scouts Solve It."
    In support of closing the cybersecurity workforce gap, the Girl Scouts launched a program aimed at strengthening the cybersecurity skills of young girls. Within the first six months of the program, 44,000 cybersecurity badges were earned by girls in…
  • "Building Biologically-Inspired Software"
    Engineers in the Department of Electrical Engineering at the University of South Florida have developed new network protection software that is based on the human immune system. Researchers looked at the mechanisms of human immune system to see how they…
  • "Popular Video and Sound Editing Website VSDC Hacked to Propagate Banking Trojans"
    Security researchers at Doctor Web discovered the compromise of the popular video editing website, VSDC, by hackers. Download links on the VSDC website were hijacked in order to infect the video editing website with a banking Trojan (Win32.Bolik.2) and…
  • "Majority of Organizations Lack a Cybersecurity Incident Response Plan"
    Findings of a study on cyber resilience by IBM Security and the Ponemon Institute indicate that the majority of organizations do not have a cybersecurity incident response plan in place in the event that a cyber incident occurs. The implementation of…
  • "Majority of Hotel Websites Leak Guest Booking Info"
    New research conducted by Symantec reveals the leakage of detailed guest booking data by the majority of hotels to third-party advertisers, social media websites, and more. This data includes information such as names, addresses, mobile phone …
  • "Phishing Scheme Uses Legit Signup Forms to Steal Payment Card Data"
    Security researchers have found that cybercriminals are using signup forms for official newsletters from the websites of international companies to hide phishing attacks. According to researchers, these phishing emails can evade spam filters used by…
  • "New Super-Secure Wi-Fi Is Actually Full of Security Holes"
    Wi-Fi Protected Access 3 (WPA3) isn't as secure as it was proclaimed to be as researchers have uncovered critical design flaws in the Wi-Fi security and authentication standard. According to researchers, WPA3 is vulnerable to the same attacks that WPA2…
  • "Google's Making It Easier to Safeguard Sensitive Data Troves"
    Google's Data Loss Prevention (DLP) tool has the capability to perform scans of large amounts of data in the cloud in order to identify and redact the data that is sensitive. The tool is used in many Google products, but it can also be used by…
  • "Is AI In Cyber Security A New Tool For Hackers In 2019?"
    AI is being used more and more to help protect from cyberattacks.  AI uses machine learning to enhance its intelligence. To improve cybersecurity, it fills the gap of lack of skills to prevent cyber attacks. While AI can improve…
  • "Framing Supply Chain Attacks"
    As software development teams are pressured to deliver applications in a short amount of time, they often turn to open source components, code reuse, and third-party integrations, thus increasing the vulnerability of applications to cyberattacks and…
  • "DNS hijacking campaigns target Gmail, Netflix, and PayPal users"
    There is a DNS hijacking campaign that has been ongoing for the past three months.  Attackers are targeting the users of popular online services, including Gmail, Netflix, and PayPal. During the DNS hijacking, the hacker compromises …