News
  • "Cyber Toolkit for Criminal Investigations"

    Cybersecurity experts at Purdue University have developed a cyber toolkit that can help criminal investigators solve cybercrimes. The toolkit, called FileStar, unifies the top open source investigative tools used by digital forensic law enforcement teams…

  • "First Reputation-Based Blockchain Guarantees Security Against 51 Percent Attacks"

    A team of researchers has developed a blockchain system that is resilient against attackers who can control most of the system's computing power. The secure blockchain system, called RepuCoin, applies the concept of reputation to defend against attackers…

  • "Scanning for Active IPv6 Hosts with UPnP"

    A technique for identifying IPv6 hosts has been developed by researchers from Cisco Talos. The technique involves the use of the Universal Plug and Play (UPnP) protocol. It essential that tools have the capability to scan for IPv6 hosts as the…

  • "Hackers Bypass MFA on Cloud Accounts via IMAP Protocol"

    Proofpoint researchers conducted a study in which they discovered that a significant portion of Microsoft Office 365 and G Suite accounts have been hit with IMAP-based password-spraying attacks. Attackers perform password-spraying by combining multiple…

  • "Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites"

    The FBI shutdown 15 of the largest distributed denial-of-service (DDoS) for hire vendors (booters).  Since the 15 vendors have been shut down, it has reduced the overall number of attacks worldwide by nearly 11 percent compared to the same…

  • "New Mirai Variant Targets Business Presentation and Display Devices"

    Researchers at Palo Alto Networks have discovered a new variant of the Mirai botnet, which targets WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs. These technologies are mostly used by enterprises, indicating the increased…

  • "Hackers Exploit Urgency, Personalization in Phishing Attacks"

    A report released by Barracuda Networks, a security firm, highlights the exploitation of personalization and urgency in the launch of spear-phishing attacks in order to increase the success of phishing scams. According to the report, hackers customize…

  • Pub Crawl #25

     

  • "Google Photos Vulnerability Could Have Let Hackers Retrieve Image Metadata"

    A flaw in the web version of Google Photos could have enabled hackers to track a user's location history. Through the exploitation of this flaw, attackers could have retrieved metadata from images stored in a user's Google Photos account to find out…

  • "Experts uncovered a malspam campaign using Boeing 737 Max crash"

    Hackers always try their best to exploit the attention of the people on the events that made the headlines. Especially tragic events like Boeing 737 Max crash or the mosque shooting in New Zealand.  Threat actors are sending emails posing as a…

  • "Donated Devices Are Doxing Your Data, Says New Research"

    A security researcher from Rapid7 found more than 300,000 files that reveal sensitive information such as credit card numbers, Social Security numbers, driver's license data, and more. These files were discovered as a result of the analysis of 85…

  • "Security Researchers Reveal Defects That Allow Wireless Hijacking of Giant Construction Cranes, Scrapers and Excavators"

    Security researchers at Trend Micro have brought further attention to the possibility of hijacking massive industrial machines such as cranes, excavators, and scrapers, through the abuse of poorly secured radio frequency (RF) remote controllers.…