News
-
"Open-Source Security: It's Too Easy to Upload 'Devastating' Malicious Packages, Warns Google"Google has been working on finding malicious code packages sneaked into open source software projects. The Open Source Security Foundation's (OpenSSF) Package Analysis Project aims to help automate the process of identifying malicious packages…
-
"Open-Source Security: It's Too Easy to Upload 'Devastating' Malicious Packages, Warns Google"Google has been working on finding malicious code packages sneaked into open source software projects. The Open Source Security Foundation's (OpenSSF) Package Analysis Project aims to help automate the process of identifying malicious packages…
-
"SolarWinds Hackers Set Up Phony Media Outlets To Trick Targets"Nobelium, the Russian hacking group behind the SolarWinds hack, is setting up new infrastructure to launch attacks using old tricks, researchers at Recorded Future found. The researchers stated that the group has evolved in recent months in an…
-
"Mental Health and Prayer Apps Fail the Privacy Test"Security researchers at Mozilla have discovered that over 90% of mental wellness and prayer apps contain serious privacy issues, while many others raise cybersecurity concerns. The researchers found that 29 out of the 32 apps analyzed did not pass…
-
"Scientific Advance Leads to a New Tool in the Fight Against Hackers"Quantum mathematicians at the University of Copenhagen have made an advancement towards a new form of security identification that could help protect data from hackers and cybercriminals. They were able to solve a mathematical riddle, which enables the…
-
"One of the Most Powerful DDoSes Ever Targets Cryptocurrency Platform"Cloudflare has blocked one of the largest Distributed Denial-of-Service (DDoS) attacks ever recorded. According to Cloudflare, the attack bombarded a cryptocurrency platform with 15.3 million requests. DDoS attacks are measured in different ways,…
-
"Cyberespionage APT Now Identified as Three Separate Actors"The threat group known as TA410 has been found to be composed of three groups, each of which has its own toolsets and targets. The threat group, which has launched sophisticated cyberespionage attacks against US utilities, has been in operation globally…
-
"15 Most Exploited Vulnerabilities of 2021"Recently the U.S. Cybersecurity and Infrastructure Security Agency (CISA), U.S. National Security Agency (NSA), U.S. Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand…
-
"Smile Brands Breach Impacts 2.5 Million Individuals"The number of individuals affected by a data breach at one of the largest providers of dental support services in the United States has increased to more than 2.5 million. Smile Brands initially disclosed a data security incident involving ransomware in…
-
"Coca-Cola Investigates Data Breach Claim"Coca-Cola is investigating claims made by the Russian-linked cybercrime gang Stormus of a large-scale data breach. The ransomware group posted on its website this week that it had successfully hacked the servers of the soft drinks giant and stolen…
-
"The Risks Of Attacks That Involve Poisoning Training Data For Machine Learning Models"Machine Learning (ML) algorithms can leak information contained by the data used to train them using their model parameters and predictions. Therefore, it is possible for malicious users with general access to the algorithm to reconstruct and infer…
-
"New Bumblebee Malware Loader in Active Development"Three threat groups have been observed delivering a new sophisticated malware loader dubbed Bumblebee. According to researchers with Proofpoint, the loader, written in C++, is in active development and applies complex detection evasion techniques. The…