News
  • "Threat Actors Exploiting Red Team Tool JexBoss"
    A US-CERT alert has been issued by DHS' National Cybersecurity and Communications Integration Center (NCCIC) pertaining to the abuse of a red team tool by attackers, called JexBoss (JBoss Verify and EXploitation). Attackers are testing and…
  • "Iran May Launch Cyberattacks in Retaliation for New U.S. Sanctions"
    Iran is expected to launch increasingly hostile cyberattacks on its regional neighbors in response to new sanctions on its economy that have been imposed by the U.S. In addition to an increase in the execution of more aggressive cyberattacks, Iran is…
  • "Working from Anywhere, Keeping Your Files in Sync and Staying Secure"
    In an effort to increase productivity, many enterprises of today allow their employees to work remotely from home or in other locations such as hotels, coffee shops, and more. However, there are security precautions that employees should take when…
  • "DHS Wants to Expand the Reach of Its Critical Infrastructure Cyber Training"
    The U.S. Department of Homeland Security wants the ability to simultaneously train 5,000 or more critical infrastructure operators on cybersecurity. This extended reach of training is expected to be accomplished through the use of a new video…
  • "Hackers Infect Nearly 700,000 Sites with Bitcoin-Stealing Malware"
    StatCounter is one of the most widely used web traffic analytics services that has recently been discovered by security researchers from ESET to be hacked by cybercriminals in order to inject websites with Bitcoin-stealing malware. The malware targets…
  • "Symantec Uncovers North Korean Group's ATM Attack Malware"
    Symantec researchers have discovered a malware tool used by the North Korean hacking group, Lazarus, to drain ATMs of cash. Through the use of the FastCash Trojan, the Lazarus Group has stolen millions of dollars from ATMs that are primarily located in…
  • "Securing IoT Connections by Edge Computing"
    A team of researchers has developed a new security solution aimed at securing the data produced by IoT devices. They have developed a security framework, called ReSIoT, which applies the concept of edge computing. This article continues to discuss the…
  • "IoT Botnet Infects 100,000 Routers to Send Hotmail, Outlook, and Yahoo Spam"
    A five-year-old vulnerability in software used by a significant number of router models from multiple vendors has been exploited by a new botnet, which is now composed of about 100,000 home routers. The latest IoT botnet, called BCMUPnP_Hunter, is…
  • "A DJI Bug Exposed Drone Photos and User Data"
    Check Point researchers discovered a security vulnerability in drone systems manufactured by DJI, which has now been patched. Hackers could have exploited this vulnerability to take control of users' accounts as well as gain access to private data such…
  • "Research from Tenable Shows Enterprises Are Overwhelmed by Security Vulnerabilities"
    A new report released by Tenable highlights how overwhelmed enterprises are in relation to dealing with security vulnerabilities. According to the report, enterprises detect over 100 critical vulnerabilities in their environments every day, most of which…
  • "30 Years Ago, the World’s First Cyberattack Set the Stage for Modern Cybersecurity Challenge"
    In 1988, Robert Tappan Morris inadvertently performed a type of cyberattack that is now known as a distributed denial of service (DDoS) attack. The historic program, called the Morris worm, was the first of its kind, which slowed down large parts of…
  • "NAU Electrical Engineers to Lead Development, Commercialization of Next-Gen Cybersecurity Solutions for Internet of Things"
    The National Science Foundation's Partnerships for Innovation Program has awarded a $750,000 grant to a team of electrical engineers at Northern Arizona University (NAU) in support of the team's efforts to improve the security of IoT devices against…