News
-
"Better Cybersecurity With New Material"Encryption is the most common method for protecting information. Information is encrypted using a Random Number Generator (RNG), which can be a computer program or the hardware itself. The RNG provides the keys to encrypt and unlock information at the…
-
"Scammers Can Abuse Security Flaws in Email Forwarding to Impersonate High-Profile Domains"Due to flaws in the process that enables email forwarding, it is easier than previously believed to send an email with a forged address, according to a research team led by computer scientists from the University of California San Diego. The issues…
-
"VU Researcher to Develop New Framework for Data Privacy & Utility"Dr. Yongfeng (Felix) Ge of Victoria University will develop an evolutionary computation-based framework to optimize privacy and utility issues associated with data storage and publishing. Recent large-scale data breaches in Australia, which resulted in…
-
"Project Aims to Ensure Offshore Renewable Innovations Remain Cyber-Secure"Researchers are establishing a cybersecurity research and development facility to harden offshore wind technology against cyberattacks. The Cyber-Resilience of Offshore Wind Networks (CROWN) project will establish the lab space at the University of…
-
"What's in a NoName? Researchers See a Lone-Wolf DDoS Group"NoName057(16), a Russian hacker group, conducts Distributed Denial-of-Service (DDoS) attacks against European financial institutions, government websites, and transportation services. The group recently claimed responsibility for disrupting the websites…
-
"Parcel Delivery Smishing Campaign Targets iPhone Users"According to researchers at Resecurity, a threat group that specializes in impersonating postal agencies and mail delivery companies has launched an SMS phishing (smishing) campaign against iPhone users in the US. The group develops fake but convincing…
-
"Airlines Battle Surge in Loyalty Program Fraud"According to security researchers at Group-IB, cyber fraudsters have been observed increasingly exploiting vulnerabilities in air miles and customer service systems across the EU, the UK, and the US. The researchers noted that in 2022 alone, cases…
-
"New BLISTER Malware Update Fueling Stealthy Network Infiltration"Threat actors are using an updated version of a malware loader known as BLISTER in SocGholish infection chains to distribute an open-source command-and-control (C2) framework called Mythic. According to Elastic Security Labs researchers, the new BLISTER…
-
"Hackers Exploit MinIO Storage System to Breach Corporate Networks"Hackers are exploiting two MinIO vulnerabilities to compromise object storage systems, gain access to private information, execute arbitrary code, and take control of servers. MinIO is an open-source object storage service compatible with Amazon S3 and…
-
"Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers"The Zero Day Initiative (ZDI) has announced that over $1 million in cash and prizes will be offered at the first Pwn2Own hacking contest centered on car systems. The competition, named Pwn2Own Automotive, will consist of four categories: all things Tesla…
-
"Connected Cars and Cybercrime: A Primer"When considering how to invest their budgets, Original Equipment Manufacturers (OEMs) and their suppliers may be tempted to invest less in addressing cyber threats. So far, the attacks they have encountered have not been very sophisticated or harmful.…
-
"Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data"British mesh fencing systems maker Zaun has recently disclosed that a LockBit ransomware attack potentially led to the compromise of data related to UK military and intelligence sites. Headquartered in Wolverhampton, Zaun specializes in high-…