News
-
"Security Researchers Hack and Take Home Tesla Model 3"Tesla rewarded a team of security researchers with a Tesla Model 3 in addition to a cash prize for their discovery and exploitation of a security vulnerability in the vehicle's system at the 2019 Pwn2Own hacking competition. Through the exploitation of a…
-
"Firefox and Edge Fall to Hackers on Day Two of Pwn2Own"White hat hackers were able to take down web browsers, Mozilla Firefox and Microsoft Edge, at the Pwn2Own 2019 hacking competition. It was discovered that code could be launched at the system level of a PC through the exploitation of a JIT bug contained…
-
"Researchers Take Aim at Hackers Trying to Attack High-Value AI Models"Researchers at Penn State University are working to develop technical counter-measures against attacks targeting high-value machine learning (ML) models such as those used by soldiers in the guiding of military weapon systems, economists in the…
-
"Incident Of The Week: Facebook Fails To Secure Passwords"An investigation against Facebook indicates between 200 million and 600 million users may have had their account passwords stored in plain text. The passwords were able to be seen and searched for by 20,000 employees. The issue with…
-
"Ransomware Attack Cripples Production at Aluminum Maker Norsk Hydro"Norwegian aluminium company, Norsk Hydro ASA, recently experienced a ransomware attack that resulted in the disruption of operations. The ransomware that Norsk Hydro ASA was hit with is called LockerGoga and it was also used in an attack against Altran…
-
"Cyber Toolkit for Criminal Investigations"Cybersecurity experts at Purdue University have developed a cyber toolkit that can help criminal investigators solve cybercrimes. The toolkit, called FileStar, unifies the top open source investigative tools used by digital forensic law enforcement teams…
-
"First Reputation-Based Blockchain Guarantees Security Against 51 Percent Attacks"A team of researchers has developed a blockchain system that is resilient against attackers who can control most of the system's computing power. The secure blockchain system, called RepuCoin, applies the concept of reputation to defend against attackers…
-
"Scanning for Active IPv6 Hosts with UPnP"A technique for identifying IPv6 hosts has been developed by researchers from Cisco Talos. The technique involves the use of the Universal Plug and Play (UPnP) protocol. It essential that tools have the capability to scan for IPv6 hosts as the…
-
"Hackers Bypass MFA on Cloud Accounts via IMAP Protocol"Proofpoint researchers conducted a study in which they discovered that a significant portion of Microsoft Office 365 and G Suite accounts have been hit with IMAP-based password-spraying attacks. Attackers perform password-spraying by combining multiple…
-
"Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites"The FBI shutdown 15 of the largest distributed denial-of-service (DDoS) for hire vendors (booters). Since the 15 vendors have been shut down, it has reduced the overall number of attacks worldwide by nearly 11 percent compared to the same…