News
  • "This New Ransomware Campaign Targets Business and Demands a Massive Bitcoin Ransom"
    New ransomware called Ryuk, which is believed to be linked to the North Korean hacking group known as Lazarus, has been demanding that targeted organizations pay ransoms with Bitcoin in order to recover encrypted files. The threat actors behind Ryuk has…
  • "Networking Vendors Patch Against New Cryptographic Attack"
    Researchers have found a vulnerability in the implementations of IPSec IKE used in networking devices manufactured by Cisco, Huawei, ZyXel, and Clavister. According to researchers, this vulnerability can allow attackers to perform activities such as…
  • Cyber Scene #24 - Spectrum Analysis: PRIVACY---------------?---------------SECURITY
    Cyber Scene #24 SPECTRUM ANALYSIS: PRIVACY---------------?---------------SECURITY SIRI-OUSLY, THE EYES (VICE JULY CYBER SCENE EARS) ALSO HAVE IT NOW
  • "Vulnerability Could Allow Insider to Bypass CEO's Multi-Factor Authentication"
    Okta researcher, Andrew Lee, found a vulnerability in Microsoft's Active Directory Federation Services (ADFS). ADFS is a feature that allows organizations to implement multi-factor authentication for enhanced security. The exploitation of the…
  • "Adblocking and Browser Privacy Can Be Bypassed, Researchers Find"
    A new study conducted by researchers from the Catholic University in Leuven reveals that it is possible to evade the privacy and security protections offered by desktop browsers and adblockers. According to researchers, these protections could be…
  • "Hack Mobile Point-of-Sale Systems? Researchers Count the Ways"
    Security researchers from Positive Technologies have shared research findings surrounding the security of mobile point-of-sale (mPOS) systems. Researchers have found that mPOS readers provided by vendors, including Square, SumUp, PayPal and iZettle,…
  • "There is a Massive Hole in IoT Security, Says Avast Researcher"
    Avast security researcher, Martin Horn, further highlights the insecurity of IoT devices through the discovery of a new major security hole. According to Horn, smart homes are vulnerable to being hacked through the abuse of misconfigured Message…
  • "More Efficient Security for Cloud-Based Machine Learning"
    MIT researchers have created a new system to strengthen the security of sensitive data used in online neural networks without compromising the speed at which these networks operate. The system, called GAZELLE, combines two encryption techniques…
  • "IBM’s Proof-of-Concept Malware Uses AI for Spear Phishing"
    The increasing use of artificial intelligence (AI) in the defense against cyber threats is expected to be accompanied by the growing development of attack tools that weaponize AI. IBM has developed proof-of-concept malware called DeepLocker, which uses…
  • "Web Security Gets a Boost as TLS Gets Major Overhaul"
    The Internet Engineering Task Force (IETF) has recently published the finalized version of Transport Layer Security (TLS) version 1.3. TLS 1.3 ( RFC 8446 ) improves upon the speed, performance, and security of web communications. This article continues…
  • "Security Gaps Identified in Internet Protocol 'IPSec'"
    The Internet protocol, IPSec, has been revealed by researchers to be vulnerable to attacks. The vulnerability of IPSec is due to the insecurity of the Internet Key Exchange protocol, IKEv1, which is still being used in operating systems and newer…
  • "Password Managers Vulnerable to Insider Hacking"
    A team of researchers from Aalto University and the University of Helsinki have found security vulnerabilities in popular password managers used to store login credentials. The inadequate security of the inter-process communication (IPC) channel used by…