News
-
"Security Shortage Forces CISOs to Increase Reliance on Machine Learning"F5 Labs and Ponemon conducted a survey to which CISOs from many different enterprises responded. The results of the survey indicate that CISOs are relying more on machine learning to help perform IT security functions due to the significant shortage of…
-
"UDPoS PoS Malware Exfiltrates Credit Card Data DNS Queries"Researchers at ForcePoint Labs have discovered a new point-of-sale (PoS) malware called UDPoS that uses User Datagram Protocol (UDP) DNS traffic to steal credit card information. The malware is distributed under the guise of an update from a remote…
-
“Winter Olympics Cyberattack Designed to Cause Chaos”The PyeongChang Winter Olympics recently faced a cyberattack that disrupted internal servers and public Wi-Fi. According to Cisco’s Talos Intelligence Group, the motive behind the cyberattack was to cause disruption and not to infiltrate official…
-
"US, International Law Enforcement Shut Down Massive Cybercrime Marketplace"The Infraud Organization was taken down by US law enforcement authorities as the global cybercrime group has been found to be behind the loss of over $500 million within the last seven years. 36 individuals have been charged for their alleged positions…
-
“Forging a Quantum Leap in Quantum Communication”A new method has been developed by researchers at Bar-llan University to improve the speed at which data is transferred in quantum communication. The method developed by researchers replaces the electrical nonlinearity of the standard data processing…
-
"Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets"Director of Cybersecurity Research Center Mordechai Guri and his team of researchers at Israel's Ben-Gurion University have demonstrated methods that could be used to exfiltrate data from air-gapped systems. The methods demonstrated by researchers…
-
“What is Cryptojacking and Why Is It a Cybersecurity Risk?”Cryptojacking attacks have been on the rise due to the growing popularity and value of cryptocurrency. The performance of unauthorized cryptocurrency mining is known as cryptojacking. This article continues to discuss the concept and process of…
-
“Cyberspace Triggers a New Kind of Arms Race”The cyber arms race is intensifying as automated cyber weapons become more advanced for the launch of devastating cyberattacks. The increased circulation and investment of cyber weapons among cybercriminals and malicious nation-states have triggered the…
-
"Why Developing an Internal Cybersecurity Culture Is Essential for Organizations"The European Network and Information Security Agency (ENISA) released a report focused on the development of cybersecurity culture in organizations. The report provides tools and guidance to introduce or improve upon cybersecurity culture within…
-
"Covert Data Channel in TLS Dodges Network Perimeter Protection"A new method has been identified by security researchers at Fidelis Cybersecurity that could be used by attackers to covertly exchange data during TLS negotiation and circumvent network perimeter defenses. This technique is performed through the…
-
"Record-Breaking Efficiency for Secure Quantum Memory Storage"An advancement in quantum memory performance has been made by researchers at Laboratoire Kastler Brossel on which the efficiency of optical qubit storage has been improved. This improvement in quantum memory indicates that quantum bits can be securely…
-
"Threats to Industrial Control Systems Grow as Vulnerabilities Increase"According to a research report released by Positive Technologies, the number of vulnerable industrial control devices is growing each year. The poor security of such devices significantly increases the possibility of network infiltration by…