News
  • "Hackers Bypass MFA on Cloud Accounts via IMAP Protocol"
    Proofpoint researchers conducted a study in which they discovered that a significant portion of Microsoft Office 365 and G Suite accounts have been hit with IMAP-based password-spraying attacks. Attackers perform password-spraying by combining multiple…
  • "Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites"
    The FBI shutdown 15 of the largest distributed denial-of-service (DDoS) for hire vendors (booters).  Since the 15 vendors have been shut down, it has reduced the overall number of attacks worldwide by nearly 11 percent compared to the same…
  • "New Mirai Variant Targets Business Presentation and Display Devices"
    Researchers at Palo Alto Networks have discovered a new variant of the Mirai botnet, which targets WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs. These technologies are mostly used by enterprises, indicating the increased…
  • "Hackers Exploit Urgency, Personalization in Phishing Attacks"
    A report released by Barracuda Networks, a security firm, highlights the exploitation of personalization and urgency in the launch of spear-phishing attacks in order to increase the success of phishing scams. According to the report, hackers customize…
  • Pub Crawl #25
     
  • "Google Photos Vulnerability Could Have Let Hackers Retrieve Image Metadata"
    A flaw in the web version of Google Photos could have enabled hackers to track a user's location history. Through the exploitation of this flaw, attackers could have retrieved metadata from images stored in a user's Google Photos account to find out…
  • "Experts uncovered a malspam campaign using Boeing 737 Max crash"
    Hackers always try their best to exploit the attention of the people on the events that made the headlines. Especially tragic events like Boeing 737 Max crash or the mosque shooting in New Zealand.  Threat actors are sending emails posing as a…
  • "Donated Devices Are Doxing Your Data, Says New Research"
    A security researcher from Rapid7 found more than 300,000 files that reveal sensitive information such as credit card numbers, Social Security numbers, driver's license data, and more. These files were discovered as a result of the analysis of 85…
  • "Security Researchers Reveal Defects That Allow Wireless Hijacking of Giant Construction Cranes, Scrapers and Excavators"
    Security researchers at Trend Micro have brought further attention to the possibility of hijacking massive industrial machines such as cranes, excavators, and scrapers, through the abuse of poorly secured radio frequency (RF) remote controllers.…
  • "What recent industry data leaks tell us about CYBER-SECURITY"
    The number of reported data breaches has not  risen much over the last decade.  The concern now, is not just how many breaches occur, but more the amount of data that is stolen. Hackers are becoming much more proficient in stealing…
  • "Proof-of-Concept Tracking System Finds RATs Worldwide"
    Recorded Future, an information analysis firm, recently released a report that discusses a proof-of-concept system designed for the detection of remote-access Trojans (RATs). The system uses network scans and metadata to find RATs. This article continues…
  • "Shared Code Creates Opportunity for Hackers, Expert Warns"
    The use of open source code libraries by app developers increases the vulnerability of federal employees' mobile phones to being infiltrated by hackers as such libraries can include malicious code. The hacking of federal employees' smartphones could lead…