-
"List of Common Passwords Accounts for Nearly All Cyberattacks"Rapid7 recorded every attempt to compromise two common types of servers over a 12-month period using its honeypot network, discovering that the attempted credential attacks resulted in 512,000 permutations. Almost all of those passwords are found in a…
-
"Cyber-Enabled Crimes Are Biggest Police Concerns"According to the first ever Interpol Global Crime Trend report, Cyber-related crimes such as money laundering, ransomware, and phishing pose the biggest threat to society. The inaugural study was compiled from data received from the 195 member…
-
"Google Releases Open-Source Security Tool to Centralize SBOM Management"Open-source security is a major theme in enterprise security. Following a surge of software supply chain attacks against vendors such as SolarWinds and Colonial Pipeline, President Biden issued an Executive Order (EO) requiring organizations to develop…
-
"3M Advocate Aurora Health Patients Face PHI Exposure Tied to Tracking Pixels"Advocate Aurora Health informed 3 million patients of a data breach that may have exposed Protected Health Information (PHI). The breach was caused by the nonprofit health system's use of Google and Meta tracking pixels, which are widely used tools for…
-
"Vulnerabilities in Cisco Identity Services Engine Require Your Attention"Cisco is warning administrators of Cisco Identity Services Engine (ISE) solutions about two vulnerabilities that could be exploited to read and delete files on an affected device, as well as execute arbitrary scripts or access sensitive information. The…
-
"New URSNIF Variant Doesn't Support Banking Features"Mandiant researchers are warning of a major shift from URSNIF's original purpose, with the malware now used to deliver next-stage payloads and steal sensitive data. The malware was initially used in banking fraud. The new variant, dubbed LDR4, was…
-
"BlackByte Ransomware Uses New Data Theft Tool for Double-Extortion"A BlackByte ransomware affiliate is quickly stealing data from compromised Windows devices using a new custom data-stealing tool called 'ExByte.' One of the most important functions in double-extortion attacks is data exfiltration. Ransomware operations…
-
"Hackers Started Exploiting Critical 'Text4Shell' Apache Commons Text Vulnerability"Wordfence, a WordPress security company, announced that it began detecting exploitation attempts targeting the newly disclosed Apache Commons Text flaw on October 18, 2022. The vulnerability, CVE-2022-42889, also known as Text4Shell, has been assigned a…
-
"Focus On Cybersecurity: Researchers Develop Photonic Encryptions"As cybercrime incidents continue to rise, a consortium of research institutes, private enterprises, and universities has formed the Silhouette project to develop solutions for encrypting data in the optical domain that is considered safe from tampering…
-
"Commonwealth Cyber Initiative Researchers Hone Cryptographic Algorithms to Stand Against Powerful Quantum Threat"The US National Institute of Standards and Technology (NIST) has challenged the world's cryptographers to develop encryption techniques to thwart cyberattacks by powerful quantum computers. Commonwealth Cyber Initiative (CCI) researchers from Virginia…
-
"Core Values Shape Success of Sherlock Team to Deliver Cybersecurity Results"The Sherlock Cloud Solutions and Services Division (Sherlock) of the San Diego Supercomputer Center (SDSC) at UC San Diego works to solve the mysteries that cyberinfrastructure and cloud computing can present to the people and places served by the…
-
"Hackers Target Australian Health Insurance Agency Medibank in Major Breach of Patient Data"It has recently been discovered that hackers have breached the cloud-based data network of one of Australia's largest health insurers, potentially exposing the personal information of millions of patients throughout the country. Medibank stated…
News