-
"Researchers Find 'Backdoor' in Encrypted Police and Military Radios"The TETRA standard is used globally in radios. According to security researchers, multiple vulnerabilities have been discovered in the fundamental cryptography and its implementation, including issues that enable the decryption of traffic. A group of…
-
"Thousands of Citrix Servers Exposed to Zero-Day Bug"Security researchers at the Shadowserver Foundation have found that over 15,000 Citrix servers worldwide are at risk of compromise unless administrators patch urgently. The researchers noted that of the impacted servers, the most significant number…
-
"Banking Sector Targeted in Open-Source Software Supply Chain Attacks"Researchers have found what they say are the first open source software supply chain attacks that specifically target the banking sector. Checkmarx noted that these attacks exhibited sophisticated techniques, including targeting specific components in…
-
"Stolen Microsoft Key Offered Widespread Access to Microsoft Cloud Services"According to Wiz security researchers, the Microsoft consumer signing key stolen by Storm-0558 hackers gave them access beyond the Exchange Online and Outlook[.]com accounts that Redmond said were compromised. Redmond disclosed that the attackers had…
-
"Average Cost of a Data Breach Reaches $4.45 Million in 2023"IBM published its annual Cost of a Data Breach Report, revealing that the global average data breach cost reached $4.45 million in 2023, a 15 percent increase over the previous three years. Detection and escalation costs increased by 42 percent during…
-
"BGP Software Vulnerabilities Under the Microscope in Black Hat Session"In a presentation at Black Hat USA, Forescout researchers will bring attention to Border Gateway Protocol (BGP) implementation flaws. Few technologies are more fundamental to the Internet than BGP, which manages the transmission of data packets between…
-
"Purdue Part of a National Research Center Aimed At Hardening Transportation Systems Against Cyberattacks"Purdue University has been selected as a partner in a new University Transportation Center (UTC) focused on cybersecurity and funded by the US Department of Transportation (DOT). The Transportation Cybersecurity and Resilience (TraCR) center, led by…
-
"Privacy and Security Crucial for Healthcare Robot Adoption – According to New Report"According to a recently published white paper by Sheffield Hallam University, healthcare robotic systems must prioritize security and privacy protections. The paper calls for "secure by design" and "privacy by design" principles to increase user trust in…
-
"Game Theory Comes to the Defense of the Smart Grid"There are various infiltration strategies adversaries can use to threaten the smart grid. For example, in a false-data injection attack, someone could hack into the grid's communication networks and replace actual measurements with false data. Denial-of-…
-
"A Nested Inventory for Software Security, Supply Chain Risk Management"High-profile data breaches such as Kaseya and Apache Log4j continue to impact organizations, thus making software supply chain security more important than ever. A Software Bill of Materials (SBOM) consists of all the components and libraries used to…
-
"First Search Result Leads to Malware: Crooks Now Paying for Ads"Cybercriminals continue to look for new methods to manipulate search results. They are flooding Google with paid advertisements through malvertising campaigns, which direct unsuspecting users to malicious websites that exploit their data and trust. The…
-
"71 Percent of Organizations May Have Been Breached and Not Know About It"Vectra AI has released a new research report revealing that 97 percent of analysts are concerned about missing security events. Seventy-one percent acknowledge that their organization may have been compromised, but they are unaware of it. Analysts are…
News