-
"New SHC-Based Linux Malware Targeting Systems With Cryptocurrency Miner"A new Linux malware created with the Shell Script Compiler (SHC) has been seen deploying a cryptocurrency miner on infected systems. The AhnLab Security Emergency Response Center (ASEC) suspects that following successful authentication through a…
-
"Over 60,000 Exchange Servers Vulnerable to ProxyNotShell Attacks"One of the two security flaws targeted by ProxyNotShell exploits, the CVE-2022-41082 Remote Code Execution (RCE) vulnerability, has not been patched on more than 60,000 online Microsoft Exchange Servers. According to security researchers at the…
-
"Researchers Discover Critical Vulnerabilities in Ferrari, BMW, Toyota, and Other Automotive Giants"Researchers, including web application security expert Sam Curry, uncovered major vulnerabilities affecting Ferrari, BMW, Toyota, Ford, and other automobile manufacturers. The researchers discovered a compromised undisclosed system used by AT&T that…
-
"Raspberry Robin Worm Hatches a Highly Complex Upgrade"The complexity of the new version of the Raspberry Robin framework being used by hacking groups to attack Spanish- and Portuguese-speaking financial institutions has increased significantly, according to researchers. According to a report published by…
-
"NJ Hospital CentraState Diverting Patients After Cyberattack, IT Shutdown"The CentraState Medical Center in New Jersey, Hospital for Sick Children (SickKids), and Queen Elizabeth Hospital (QEH) in Barbados are experiencing ongoing difficulties due to cyberattacks. John Riggi, the American Hospital Association's National…
-
"Hacking the Metaverse: Why Meta Wants You to Find the Flaws in Its Newest Headsets"When a new technology arrives, cybercriminals often instantly explore its potential benefits. Internet of Things (IoT) devices and other technologies are targeted by cybercriminals seeking to steal passwords, personal information, bank account…
-
-
Spotlight on Lablet Research #37 - Model-Based Explanation for Human-in-the-Loop SecuritySpotlight on Lablet Research #37 - Model-Based Explanation for Human-in-the-Loop Security
-
Cyber Scene #75 - Cyber Security: Past, Present and FutureCyber Scene #75 - Cyber Security: Past, Present and Future
-
Cybersecurity Snapshots #37 - New Ransomware Families and VariantsCybersecurity Snapshots #37 - New Ransomware Families and Variants
-
"How Can the White House's New IoT Labels Improve Security?"The National Security Council (NSC) of the White House is working on a project aimed at improving Internet of Things (IoT) consumer security through industry-standard labeling. If successful, the labeling system will replace existing frameworks. The IoT…
-
News