News
-
"MailChimp Discloses New Breach After Employees Got Hacked"Hackers gained access to an internal customer support and account administration tool at the email marketing provider MailChimp, allowing threat actors to access the data of 133 customers. According to MailChimp, the attackers obtained employee…
-
"ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware"New research suggests that the motive of financial and political gain, partially fueled by the ongoing conflict in Ukraine, has prompted threat actors to target Industrial Control Systems (ICS) with more disruptive cyberattacks, thereby diversifying the…
-
"New Research Delves into the World of Malicious LNK Files and Hackers Behind Them"There has been an increase in cybercriminals' use of malicious LNK files as a point of entry to download and execute payloads such as Bumblebee, IcedID, and Qakbot. A recent study by cybersecurity experts demonstrated that it is possible to identify…
-
"OneButtonPIN Increases Security for Blind and Low-Vision Tech Users"Researchers at the University of Waterloo and the Rochester Institute of Technology (RIT) have developed a new authentication method to help Blind and Low-Vision (BLV) people access their devices more securely. The method called OneButtonPIN allows BLV…
-
"Quantum Computers Threaten Our Whole Cybersecurity Infrastructure: Here's How Scientists Can Bulletproof It"The security of the RSA protocol relies on the current absence of an efficient algorithm to factorize large numbers. Cryptographic protocols require the adversary to factorize a very large number to decrypt a message, which is currently impossible. The…
-
"Crypto Wallet of NFT Influencer Wiped Away by Google Ads Malware"According to a Non-Fungible Token (NFT) influencer known as "NFT God" on social media, a Google Ads-delivered malware attack cost them thousands of dollars in NFTs and cryptocurrency. The influencer stated that their livelihood was violated by the attack…
-
"APIs in Vehicle Software Vulnerable to Attacks"Application Programming Interfaces (APIs) are used in all of today's software, including the software in newer vehicles. This dependency has already resulted in critical vulnerabilities involving car owners' Personally Identifiable Information (PII), GPS…
-
"University of Texas at Austin Blocks TikTok From Its IT Network"The University of Texas at Austin blocked TikTok from its IT network on Wednesday under an earlier order by Gov. Greg Abbott banning the short-form video app from state-managed electronic resources. This makes it impossible for users of TikTok to…
-
"CISA Warns of Serious Flaws in CONPROSYS HMI Software"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) warns of a collection of vulnerabilities in the widely deployed CONPROSYS Human-Machine Interface (HMI) software that could allow an unauthenticated, remote…
-
"A Couple of Bugs Can Be Chained to Hack Netcomm Routers"Experts warn of the potential exploitation of two critical vulnerabilities found in Netcomm routers. The vulnerabilities, tracked as CVE-2022-4873 and CVE-2022-4874, are stack-based buffer overflow and authentication bypass flaws. Both vulnerabilities…
-
"Law Enforcement Takes Down Crypto Exchange Allegedly Used to Launder $15 Million in Ransomware Payments"The Department of Justice (DOJ) has announced the arrest of the Russian co-founder of a cryptocurrency exchange allegedly used to launder cybercrime proceeds. Deputy Attorney General Lisa Monaco considers Anatoly Legkodymov's arrest for "unlicensed money…
-
"Over Four Billion People Affected By Internet Censorship in 2022"According to new research by VPN provider Surfshark, internet shutdowns affected a total of 4.2 billion people in 2022, with individuals experiencing 112 internet restrictions across 32 countries throughout the year. Thirty-four of these cases…