News
-
"Researchers Discover Two Dozen Malicious Chrome Extensions"Researchers at the security vendor Cato Networks discovered two dozen malicious Google Chrome browser extensions. They also found 40 malicious domains associated with the extensions that are being used to inject adware, steal credentials, and redirect…
-
"Your Streaming Service Is Fertile Ground for Bot Attacks"Streaming services have become increasingly attractive targets in the launch of malicious bots by cybercriminals to steal customer account information. Customers often use easier password combinations for streaming services because these services do not…
-
"Data Loss Impacts 40% of SaaS App Users"Researchers from Rewind, a provider of cloud backups for SaaS applications, discovered that 40% of Software as a Service (SaaS) users across a range of industries had lost data stored in their online tools. A total of 631 respondents answered questions…
-
"Challenges And Benefits of Using Threat Data Feeds"Researchers at Ponemon Institute discovered that threat data feeds could help organizations strengthen their cybersecurity posture. The researchers surveyed 1025 IT security practitioners (70% of whom were at or above the supervisory level) in the…
-
"REvil Ransomware Hits Acer; Threat Actors Demand $50 Million in Ransom"The computer manufacturer Acer has fallen victim to the REvil ransomware attack, with the threat actors demanding a ransom of more than $50 million. The ransomware operators infiltrated Acer's network systems. They allegedly shared images of the files…
-
"Ransomware Attack Foils IoT Giant Sierra Wireless"A ransomware attack on leading internet-of-things (IoT) manufacturer Sierra Wireless this week grounded its production activity to a halt and froze various other internal operations. The Canadian multinational manufacturer creates a broad array of…
-
"Purple Fox Malware Targets Windows Machines With New Worm Capabilities"Researchers at Guardicore Labs have discovered that a malware that has historically targeted exposed Windows machines through phishing and exploit kits has been retooled to add new “worm” capabilities. Purple Fox, which first appeared in 2018, is…
-
Cyber Scene #54 - US-China: Cyber Syndrome or War of the Worlds?Cyber Scene #54 - US-China: Cyber Syndrome or War of the Worlds?
-
SoS Musings #47 - The Problem with False Positives in Security OperationsSoS Musings #47 - The Problem with False Positives in Security Operations
-
"Dark Web Bursting With COVID-19 Vaccines, Vaccine Passports"Security researchers at Check Point have observed a 300 percent increase in listings on the dark web marketplaces advertising vaccine doses, falsified vaccine certifications, negative test results, and more in the last three months. According to the…
-
"Protecting Open-Source Software by Analyzing Community Behavior"The Defense Advanced Research Projects Agency (DARPA) wants to develop a dynamic and continuously updated open-source software (OSS) situational awareness capability to preserve the security of the US Defense Department's OSS supply chain. The…
-
"New Cybersecurity Programs to Protect US Energy"The Department of Energy's (DOE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER) has announced three new researcher programs aimed at strengthening the security of America's energy system against cyberattacks and physical hazards…