News
-
"Hackers Can Infect over 100 Lenovo Models with Unremovable Malware"Lenovo has released security updates for over 100 laptop models to fix critical Unified Extensible Firmware Interface (UEFI) vulnerabilities. The exploitation of these vulnerabilities could allow advanced hackers to install malicious firmware that can be…
-
"Attacker Dwell Times Down, But No Consistent Correlation to Breach Impact: Mandiant"Security researchers at Mandiant have found that the median intruder dwell time is down again, from 24 days in 2020 to 21 days in 2021. The bad news is the figure gives little indication of the true nature of successful intruder activity across the…
-
"Security Tool – Privid – Guarantees Privacy in Surveillance Footage"Researchers from the Massachusetts Institute of Technology's (MIT) Computer Science and Artificial Intelligence Laboratory (CSAIL) collaborated with other institutions to develop a system called Privid that ensures the privacy of video footage from…
-
"Blockchain Warning: Hackers Are Targeting Developers and DevOps Teams"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the US Treasury Department have issued a joint cybersecurity advisory warning all businesses in cryptocurrency…
-
"Zero-Day Exploits Found And Disclosed Hit a Record High in 2021, Google Project Zero Says"Security researchers at Google’s Project Zero stated that they tracked 58 cases of zero-day exploits “in the wild” in 2021, which is the most ever detected and disclosed in a single year since the group began its work in mid-2014. The 2021 total is…
-
"GitHub: Stolen OAuth Access Tokens Used by Hackers to Breach Organizations"The cloud-based repository hosting service, GitHub, has disclosed that an unknown adversary used stolen OAuth user credentials to extract sensitive data from various organizations. GitHub’s Mike Hanley revealed the abuse of stolen OAuth user tokens…
-
"LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks"During a new study by Check Point Research, the cybersecurity vendor found that LinkedIn has become by far the most impersonated brand for phishing attacks. The researchers revealed that phishing attacks impersonating the professional social…
-
"Data Scientists, Watch Out: Attackers Have Your Number"According to an advisory recently published by the cloud-protection firm Aqua Security, attackers are scanning for data-science applications such as Jupyter Notebook and JupyterLab, along with cloud servers and containers for misconfigurations. Aqua…
-
"Information-Stealing Malware Is Spreading Widely on Telegram, Cisco Talos Says"The new information-stealing malware that Cisco Talos researchers identified last month, which they have dubbed ZingoStealer, is now being shared on Telegram by a collective of cybercriminals called Haskers Gang. They have been targeting Russian speakers…
-
"FBI Warns of 'Reverse' Instant Payments Phishing Schemes"The Federal Bureau of Investigation (FBI) warns of a new phishing scheme aimed at tricking victims into making money transfers to accounts controlled by cybercriminals. During the attacks, the adversaries target users of digital payment…
-
"What CISA Wants Critical Infrastructure Partners to Report on Cyber Incidents"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has published a guide on the type of cyber incidents that critical infrastructure entities should be sharing with the government and how they should be sharing…
-
"NATO Cyber Game Tests Defenses Amid War in Ukraine"NATO's large, annual cyber wargames, known as the Locked Shields exercise, will bring together technical experts from alliance countries and Ukraine on Tuesday. The North Atlantic Treaty Organization's Cooperative Cyber Defense Centre of Excellence…