-
"Organizations Still Struggle to Manage Vulnerability Patches, Report"The results of a survey conducted by Tripwire to which 340 information security professionals responded, further highlight that many companies still fall short in the management of vulnerability patches. In addition, there is an insufficient visibility…
-
Adware Hidden in Android Apps Downloaded More Than 440 Million TimesIn a study, it was discovered that 238 applications in Google Play hid BeiTaAd, a well-obfuscated ad plugin that could display ads on the device's lock screen, trigger video and audio advertisements while the phone is asleep, and display…
-
"Email Still a Major Attack Vector: Security Research"Email remains one of the main attack vectors used by cybercriminals. Key findings from different research reports, including those released by Mimecast, Proofpoint, Rapid7, Vade Secure, and more, have been highlighted by eSecurityPlanet. According to…
-
"ARCHANGEL: Securing National Archives with AI and Blockchain"Researchers at the University of Surrey have developed state-of-the-art artificial intelligence (AI) technologies and a blockchain aimed at bolstering security for digital government records of national archives. The system, called ARCHANGEL, combines AI…
-
"The Growing Importance of Bio-Cybersecurity"Healthcare systems are offering DNA sequencing as a result of the increased demand for genetic screening by patients. However, as the performance of DNA sequencing grows, the security of patients' genetic data needs to be taken more seriously by…
-
"Is AI fundamental to the future of cybersecurity?"Most security professionals agree that AI Solutions must be implemented to keep an organization safe of cyberattacks. In a study conducted, it was discovered that 69 percent of security professionals are looking to implement AI…
-
"93% of Companies Are Overconfident of Their Ability to Stop Data Breaches"A report released by Certify and Techvangelism shows that most companies have great confidence in their ability to defeat data breaches. However, almost 80% of these companies lack approaches to combatting privileged access management (PAM) cyberattacks…
-
"ForeScout: Without Visibility and Control, OT Security Remains at Severe Risk"Further attention is being brought to the cybersecurity of operational technology (OT). Physical infrastructure is a way in which cybercriminals can infiltrate an enterprise network. OT systems are now more connected to the internet and joined with IT…
-
"Vulnerability of Cloud Service Hardware Uncovered"Scientists at Karlsruhe Institute of Technology (KIT) have discovered that field-programmable gate arrays (FPGAs) are vulnerable to side-channel attacks. FPGAs are often considered for use in the development of new systems because of the modifiable…
-
"APPLE JUST PATCHED A MODEM BUG THAT'S BEEN IN MACS SINCE 1999"A modem configuration bug has been discovered, that's been in Apple operating systems since 1999. The flaw could have potentially been exploited by an attacker to get persistent, remote root access to any Mac. Only certain generations of OS X and macOS…
-
"Unsecured Database Exposes 85GB in Security Logs of Major Hotel Chains"Researchers at vpnMentor discovered an unsecured database that exposed 85.4GB of major hotel chains' security logs. The exposure of security audit logs could lead to the exposure of cybersecurity weaknesses contained by major hotels, including Marriott.…
-
"Unknowingly Loading Malicious Content from 'Trusted' Sites"Findings from a study conducted by researchers from CSIRO's Data61, an arm of Australia's national science agency specializing in data and digital technology, reveals that about half of the Internet's most visited websites are vulnerable to being used…
News