News
-
"Citadel Researchers Propose A Deep Learning Technique To Generate DNS Amplification Attacks"Deep learning algorithms have shown promise in detecting and characterizing cybersecurity breaches. However, fraudsters have been working on new attacks to disrupt the operation of various deep learning systems, such as those used for image analysis and…
-
"T-Mobile Settles to Pay $350M to Customers in Data Breach"In a class action lawsuit, T- Mobile agreed to pay $350 million to customers affected by a cyberattack disclosed last August. Personal data like social security numbers were stolen during the cyberattack. In a Securities and Exchange Commission filing on…
-
"1,000 Organizations Exposed to Remote Attacks by FileWave MDM Vulnerabilities"Security researchers at Claroty discovered vulnerabilities affecting a mobile device management (MDM) product from FileWave, exposing many organizations to remote attacks. FileWave MDM product is affected by two critical security holes:…
-
"Hackers Target 10,000 Organizations With a New MFA Bypass in Coordinated Phishing Campaign on Office 365 Users"Microsoft discovered a new Multi-Factor Authentication (MFA) bypass tactic that was used in a coordinated phishing campaign that targeted over 10,000 organizations. According to the company, the attackers used a malicious proxy server to steal login…
-
"Monitoring the Impact of Security Solutions on User Experiences Is Critical"According to Broadcom Software, modern organizations are challenged by conflicting demands to secure the enterprise while providing excellent end-user experiences. Broadcom Software's survey findings reveal that more than half of respondents prioritize…
-
"Raccoon Stealer is Back — How to Protect Your Organization"The Raccoon Stealer Malware-as-a-Service (MaaS) platform rose to prominence several years ago due to its ability to extract data from a web browser. This data initially included passwords and cookies, which allow a recognized device to be authenticated…
-
"QBot Phishing Uses Windows Calculator Sideloading to Infect Devices"The QBot malware's operators have been using the Windows Calculator to side-load the malicious payload onto infected computers. DLL side-loading is a common attack method that takes advantage of how Windows handles Dynamic Link Libraries (DLLs). It…
-
"Cyberattacks on Port of LA Double"Gene Seroka, executive director at the Port of Los Angeles, stated that he has seen an extraordinary increase in cyberattacks targeting the port since the start of the pandemic. The Port of Los Angeles is one of the world’s busiest ports and is the…
-
"French Android And iPhone Users Being Targeted by Roaming Mantis Financial Hackers"Roaming Mantis, a mobile threat operation, has been linked to a new wave of breaches targeting French mobile phone users, months after expanding its scope to include European countries. According to a study released by Sekoia, the active malware…
-
"Researchers Identify a Resilient Trait of Deepfakes That Could Aid Long-Term Detection"The computer vision and security research community has been trying to define an essential characteristic of deepfake videos or signals that may be resistant to advancements in popular facial synthesis technologies. Such technologies include autoencoder-…
-
"NIST Updates Healthcare Cybersecurity, HIPAA Security Rule Guidance"To assist organizations in safeguarding protected health information, the National Institute of Standards and Technology (NIST) issued updated healthcare cybersecurity and HIPAA Security Rule guidance. NIST is accepting comments on the draft publication…
-
"Global Firms Fear the Worst Over Risk Management Failures"Security researchers at Trend Micro polled over 6290 IT and business decision-makers from over 29 countries to compile its latest research. The researchers found that over half (54%) of global organizations believe their risk assessments aren’t…