News
  • "Beware the Man in the Cloud: How to Protect Against a New Breed of Cyberattack"
    Man-in-the-cloud (MitC) attacks have become more frequent. The goal of an MitC attack is to access cloud accounts without having to attain compromised user credentials. These attacks occur through the exploitation of the OAuth synchronization token…
  • "Questioning the Effectiveness of Offensive Cyber Operations"
    The competition between rival states to gain power now significantly involves the use of cyber operations. Brandon Valeriano and Benjamin Jensen have ignited further discussion surrounding the effectiveness of offensive cyber operations in relation to…
  • "New Attacks Target Recent PHP Framework Vulnerability"
    A recently discovered code execution vulnerability contained by the ThinkPHP framework is being exploited by multiple threat actors to execute cryptominers, skimmers, and more. The vulnerability has also been found to be used by attackers to deliver a…
  • "Data Breaches Are Inevitable – Here’s How to Protect Yourself Anyway"
    As data breaches continue to increase in frequency and impact, it is important that people consider different ways in which they can protect their personal data. Cybersecurity researchers urge people to keep their software up-to-date with the…
  • "On Facebook and Twitter Your Privacy Is at Risk—Even If You Don't Have an Account"
    Findings of a new study conducted by a team of scientists from the University of Vermont and the University of Adelaide suggest that a person's identity and future activities can be predicted through the examination of messages and posts made by their…
  • "Nearly 773 Million Email Addresses Leaked, Spelling Trouble for People Who Re-Use Passwords"
    Security researcher, Troy Hunt, recently reported a massive data breach in which almost 773 million addresses and 22 million unique passwords have been exposed. The data that has been compromised was hosted on a cloud storage service, called MEGA.…
  • "Google Play Malware Used Phones’ Motion Sensors to Conceal Itself"
    Trend Micro researchers have discovered the use of motion sensors by malicious Google Play apps, BatterySaverMobi and Currency Converter, to evade detection. The motion-sensor input of infected devices is monitored by the malicious apps prior to…
  • "International Award-Winning Technology Protects the Power Grid by Hacking Would-Be Hackers"
    A system aimed at improving the security of the power grid against hackers has been developed by Milos Manic, professor of computer science and director of VCU’s Cybersecurity Center, in collaboration with the Idaho National Laboratory (INL). The…
  • "Cyberattacks Now Cost Businesses an Average of $1.1M"
    A new report by Radware highlights the rising average cost of a cyberattack faced by a business. According to the report, the average estimated cost of a cyberattack on a company has risen to $1.1 million. The report also brings further attention to the…
  • "Decrypted Telegram Bot Chatter Revealed as New Windows Malware"
    Following the discovery of a vulnerability in Telegram's encryption, researchers at Forcepoint Labs found that a hacker has been using a Telegram bot to communicate with new malware, called GoodSender. The commands sent via the Telegram bot to the…
  • "Cryptomining Malware Uninstalls Cloud Security Products"
    New cryptocurrency mining malware has been identified by researchers from Palo Alto Networks' Unit 42. The new malware is unique in that it is capable of uninstalling cloud security products such as those that are developed by Tencent Cloud and…
  • "Fortnite Had a Security Vulnerability That Let Hackers Take over Accounts"
    Security researchers at Check Point discovered vulnerabilities contained by the Epic Games' website that could have allowed hackers to hijack the accounts of Fortnite gamers. The unauthorized access of Fortnite accounts would have enabled the…