-
"Memory-Based Cyberattacks Become More Complex, Difficult To Detect"Malicious actors increasingly use memories as entry points for cyberattacks, thus igniting concerns about system-level security since memories are nearly found everywhere in electronics, and breaches are hard to detect. Hackers continue targeting almost…
-
"In the Wake of Recent Data Breaches, Here's Why You Need to Check Your Credit Score. It Could Even Help Track Down Criminals"Millions of Australians' privacy has been violated due to recent cyberattacks on Optus, Medibank, and other companies. Cybercriminals stole sensitive health and financial information that could be used to demand a ransom from victims, commit fraud, and…
-
"Cybersecurity Workforce Is Growing, But Worldwide Workforce Gap of 3.4 Million Continues to Present Problems"According to the annual (ISC)2 Cybersecurity Workforce Study, more cybersecurity professionals are working than ever, but the field is still far from being fully staffed. Despite a record 4.7 million cybersecurity professionals working worldwide, there…
-
"Australia Sees Rise in Cybercrimes on Back of 'Destructive' Ransomware, State Actors"In the past year, Australia had one cybercrime report every 7 minutes, with ransomware being the most destructive threat faced by the country. State actors continue to pose a persistent threat to the Australian Bureau of Statistics and other agencies…
-
"Analysts Track Gift Cards to See How Scammers Use Them in BEC Attacks"Cofense analysts recently conducted a five-week experiment to gain insight into how scammers use gift cards in Business Email Compromise attacks (BEC). The email security firm bought $500 worth of trackable gift cards to see what scammers did with them.…
-
"W4SP Stealer Stings Python Developers in Supply Chain Attack"Attackers are still attempting to infect developers' systems with the W4SP Stealer, a Trojan designed to steal cryptocurrency information, exfiltrate sensitive data, and collect credentials from developers' systems. According to a Phylum advisory, a…
-
"Google Proposes List of Five Principles for IoT Security Labeling"Google has proposed a set of five principles for Internet of Things (IoT) device security labeling, with the goal of increasing security and transparency for Internet-connected electronic devices. While acknowledging that there has been increased focus…
-
"CISA, FBI, MS-ISAC Provide Guidelines For DDoS Incident Response"The US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a joint guide containing…
-
"Disturbing Rise in Nation State Activity, Microsoft Reports"According to new research by Microsoft, there has been a “disturbing” increase in aggressive nation state cyber activity in the past year. The findings were published in the 2022 Microsoft Digital Defence Report (MDDR). The report showcases…
-
"Cyber Incident at Boeing Subsidiary Causes Flight Planning Disruptions"Jeppesen, a subsidiary of Boeing that provides navigation and flight planning tools, has confirmed that it is dealing with a cybersecurity incident, which has resulted in some flight disruptions. A red banner was added to the company's website, alerting…
-
"Cyberattack Causes Trains to Stop in Denmark"Trains stopped in Denmark recently as a result of a cyberattack. The incident shows how an attack on a third-party IT service provider could result in significant disruption in the physical world. According to a Danish broadcaster, all trains…
-
"Hackers Just Took Down One of the World's Most Advanced Telescopes"Chile's Atacama Large Millimeter Array (ALMA) Observatory has suffered a cyberattack that has taken its website offline and forced it to suspend all observations. In the aftermath, email services were also restricted, demonstrating the hack's broad…
News