News
-
"It Takes an Average 38 Days to Patch a Vulnerability"A new report published by TCell reveals findings of an examination of over 316 million security incidents, which highlight trends surrounding web application attacks. According to the report, the top five most common types of attacks on web…
-
"Hackers Target Smartphones to Mine Cryptocurrencies"Cryptojacking is a cyberattack in which the processing power of a computing device is hijacked to perform cryptocurrency mining. The targeting of smartphones by hackers to perform cryptojacking is increasing as indicated by recent discoveries of mobile…
-
"Researchers Propose New Method for Secure, Speech-Based Two-Factor Authentication"A new two-factor authentication (2FA) method has been developed by researchers from the University of Alabama at Birmingham. The method, called “Listening-Watch”, minimizes the amount of interaction usually required in the process of 2FA and provides…
-
The Untold Story of NotPetya, the Most Devastating Cyberattack in History -- WiredInteresting article in Wired that goes into the story of NotPetya. This was an amazing impactful malware. See more in the article: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
-
"DDoS Attack Volume Rose 50% in Q2 2018"Although there has been a decrease in the number of DDoS attacks, the volume of such attacks has increased. According to a new report released by Link11, DDoS attack volumes have risen to an average 3.3 Gbps during the second quarter of 2018. This…
-
"This New Ransomware Campaign Targets Business and Demands a Massive Bitcoin Ransom"New ransomware called Ryuk, which is believed to be linked to the North Korean hacking group known as Lazarus, has been demanding that targeted organizations pay ransoms with Bitcoin in order to recover encrypted files. The threat actors behind Ryuk has…
-
"Networking Vendors Patch Against New Cryptographic Attack"Researchers have found a vulnerability in the implementations of IPSec IKE used in networking devices manufactured by Cisco, Huawei, ZyXel, and Clavister. According to researchers, this vulnerability can allow attackers to perform activities such as…
-
Cyber Scene #24 - Spectrum Analysis: PRIVACY---------------?---------------SECURITYCyber Scene #24 SPECTRUM ANALYSIS: PRIVACY---------------?---------------SECURITY SIRI-OUSLY, THE EYES (VICE JULY CYBER SCENE EARS) ALSO HAVE IT NOW
-
"Vulnerability Could Allow Insider to Bypass CEO's Multi-Factor Authentication"Okta researcher, Andrew Lee, found a vulnerability in Microsoft's Active Directory Federation Services (ADFS). ADFS is a feature that allows organizations to implement multi-factor authentication for enhanced security. The exploitation of the…
-
"Adblocking and Browser Privacy Can Be Bypassed, Researchers Find"A new study conducted by researchers from the Catholic University in Leuven reveals that it is possible to evade the privacy and security protections offered by desktop browsers and adblockers. According to researchers, these protections could be…
-
"Hack Mobile Point-of-Sale Systems? Researchers Count the Ways"Security researchers from Positive Technologies have shared research findings surrounding the security of mobile point-of-sale (mPOS) systems. Researchers have found that mPOS readers provided by vendors, including Square, SumUp, PayPal and iZettle,…