-
"Hundreds of Thousands of Emotet Attacks Spotted Daily After Four-Month Hiatus"After a four-month hiatus, the cybercriminals running the Emotet botnet operation are already among the most high-volume threat actors in the current cybersecurity landscape. According to Proofpoint, detections of Emotet payloads dropped off in July 2022…
-
"LockBit Remains Most Prolific Ransomware in Q3"According to new research by researchers at Trellix, the infamous LockBit ransomware variant remained the most widespread in the third quarter of 2022, accounting for over a fifth (22%) of detections. The researchers noted that LockBit and Phobos…
-
"New RapperBot Campaign Targets Game Servers With DDoS Attacks"Fortinet FortiGuard Labs researchers discovered new RapperBot malware samples that are being used to build a Distributed Denial-of-Service (DDoS) botnet targeting game servers. The researchers discovered the previously undetected RapperBot Internet of…
-
"Cloud Data Protection Trends You Need to Be Aware Of"Veeam Software has released its "Cloud Protection Trends Report 2023," which covers four key "as a Service" scenarios: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Backup and Disaster Recovery-as-a-…
-
"Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon'"Since the "Shamoon" virus rendered nearly 30,000 client and server systems at Saudi Aramco inoperable more than ten years ago, destructive wiper malware still remains a major threat to enterprise organizations. Max Kersten, a malware analyst at Trellix,…
-
"Researchers Discover Hundreds of Amazon RDS Instances Leaking Users' Personal Data"New research from Mitiga, a cloud incident response company, reveals that hundreds of databases on Amazon Relational Database Service (Amazon RDS) are exposing Personally Identifiable Information (PII). According to researchers, this kind of PII leakage…
-
"MC2 Researchers Present Six Papers at ACM Security Conference"Six papers from researchers affiliated with the Maryland Cybersecurity Center (MC2) were accepted for presentation at the 2022 Association for Computing Machinery Conference on Computer and Communications Security (ACM CCS). The annual conference gathers…
-
"Commercial Repair Shops Caught Snooping on Customer Data by Canny Canadian Research Crew"Computer scientists at the University of Guelph in Canada discovered that electronics repair services lack effective privacy protocols. In addition, the researchers found that technicians often snoop on customers' data. The team describes how they tested…
-
"Researchers Break Security Guarantees of TTE Networking Used in Spacecraft"Time-Triggered Ethernet (TTE) is an example of a mixed-criticality network that can route traffic with varying levels of timing and fault tolerance requirements over the same set of hardware. Previously, spacecraft relied on one network to transmit…
-
"FBI Director Say He's 'Extremely Concerned' About China's Ability to Weaponize TikTok"On Tuesday, during a House Homeland Security Committee hearing on worldwide threats, FBI Director Christopher Wray told Congress he is “extremely concerned” that Beijing could weaponize data collected through TikTok, the wildly popular app owned by the…
-
"Lazarus Backdoor DTrack Evolves to Target Europe and Latin America"According to researchers at Kaspersky, the backdoor DTrack, widely used by the North Korean Lazarus group over the last three years, is still being deployed to target organizations in Europe and the US. DTrack has been used in financial…
-
"GAO Tells DOD to Ensure Cyber Incidents are Properly Reported and Shared"According to a new Government Accountability Office (GAO) report, the Department of Defense (DOD) has not fully implemented its cyber incident management processes. The government watchdog also discovered flaws in data reporting and management. The DOD…
News