News
-
"Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer Accounts"HR consulting firm Robert Half has recently revealed their customer's personal and financial information might have been compromised after hackers targeted their RobertHalf.com accounts. During an investigation, it was found that threat actors…
-
"Which Stolen Data Are Ransomware Gangs Most Likely to Disclose?"Security researchers at Rapid7 wanted to answer a research question they had which is "if your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the encrypt button, which types of data are more likely…
-
"Law Enforcement Dismantle Infrastructure of Russian 'RSOCKS' Botnet"The United States recently announced in a report about the takedown of a botnet operated by Russian cybercriminals that ensnared millions of devices worldwide. The botnet was dubbed "RSOCKS." The botnet initially targeted Internet of Things (…
-
"NakedPages Phishing Toolkit is Now Available on Cybercrime Forums"Cybersecurity researchers at CloudSEK have discovered a new sophisticated phishing toolkit for sale across several cybercrime forums and Telegram channels. The researchers dubbed the toolkit "NakedPages." The toolkit was developed using NodeJS…
-
"Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data"In May, cybersecurity researchers from Dr. Web discovered several apps on the Google Play Store with built-in adware and information-stealing malware. The researchers noted that the most dangerous of these apps are spyware tools capable of stealing…
-
"Severe Flaw in Anker Eufy Smart Home Hubs Makes Them Vulnerable to RCE Attacks"Anker's primary smart home device hub, Eufy Homebase 2, was discovered to have three flaws, one of which was a severe Remote Code Execution (RCE) vulnerability. The Homebase 2 serves as a video storage and networking gateway for all of Anker's Eufy smart…
-
"Internet Explorer Now Retired but Still an Attacker Target"On June 15, Microsoft officially ended support for the Internet Explorer (IE) 11 desktop application, putting an end to a browser that has been around for nearly 27 years. However, IE will continue to be a tempting target for attackers because some…
-
"Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability"WordPress websites that use the popular Ninja Forms plugin have been automatically updated to address a severe security vulnerability suspected of being actively abused in the wild. The problem, which involves a case of code injection, is rated 9.8…
-
"MaliBot Malware Bypasses Multi-Factor Authentication to Steal Your Passwords"Cybersecurity researchers at F5 Labs have detailed a newly discovered form of Android malware dubbed MaliBot, which is capable of stealing passwords, bank details, and cryptocurrency wallets from users. MaliBot can also access text messages, steal web…
-
"Sensitive Proprietary Patterns Discovered in Data Mining Given Privacy Boost"Researchers at Chongqing University have boosted the privacy and protection of proprietary or other sensitive information during data mining without compromising the ability to discover useful patterns in huge datasets. Data mining is the discovery of…
-
"Engineers Develop Cybersecurity Tools to Protect Solar, Wind Power on the Grid"Engineers at Iowa State University are working on a project aimed at securing renewable energy sources from cyberattacks. Solar panels and wind turbines, which are expected to generate 44 percent of America's electricity by 2050, pose a cybersecurity…
-
"66% of Organizations Store 21%-60% of Their Sensitive Data in The Cloud"Security researchers 451 Research found that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the previous year, raising even greater concerns regarding protecting sensitive data from…