-
"Adobe Patch Tuesday: Critical Flaws in Acrobat, Reader, Photoshop"Software maker Adobe has recently rolled out a major security update for its flagship Acrobat and Reader products to fix at least 22 documented vulnerabilities, some severe enough to allow arbitrary code execution attacks. The patches recently…
-
"ALPHV Ransomware Gang Creates Searchable Database With Victim Data"Known as BlackCat and Noberus, ALPHV emerged in November 2021 as the first ransomware family coded using the Rust programming language. To date, the ALPHV cybergang has compromised more than 100 organizations. Security researchers at Resecurity…
-
"Asset Visibility Is a Major Challenge for Security Professionals"According to a recent study by unified asset intelligence platform Armis of more than 100 security professionals, about 40 percent consider asset visibility the largest challenge confronting their organizations. Over half (54 percent) of respondents cite…
-
"DHS S&T Seeks Solutions to Software Vulnerabilities"The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has announced a new solicitation in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA) that addresses vulnerabilities in software, which is…
-
"Lithuanian Energy Firm Disrupted by DDOS Attack"Lithuanian energy company Ignitis Group was recently hit by what it described as its "biggest cyberattack in a decade" when numerous distributed denial of service (DDoS) attacks were aimed at it, disrupting its digital services and websites. Pro-…
-
"Spike in Amazon Prime Scams Expected"For online shoppers, Amazon Prime Day has become an annual retail event, an opportunity to pick up bargains and save money. Security researchers at Avanan have warned of an increase in phishing and credential harvesting email attempts in June…
-
"Researchers Defeat Facial Recognition Systems With Universal Face Mask"A team of researchers at Ben-Gurion University of the Negev and Tel Aviv University have proven that it is possible for attackers to create a face mask capable of defeating modern facial recognition systems. They validated the effectiveness of their…
-
"'Callback' Phishing Campaign Impersonates Security Firms"A new callback phishing campaign impersonates well-known security firms in order to trick potential victims into making a phone call that will instruct them to download malware. CrowdStrike Intelligence researchers discovered the campaign because…
-
"Paladin Cloud Launches New Cloud Security and Governance Platform"Securing the infrastructure remains challenging as more organizations migrate their data, applications, and workloads to the cloud. Because security teams do not always know what is going on in each cloud environment, it is difficult to detect when…
-
"Hackers Can Unlock Honda Cars Remotely in Rolling-PWN Attacks"A group of security researchers discovered that several modern Honda vehicle models have a vulnerable rolling code mechanism that allows remote unlocking and engine starting. The vulnerability, called Rolling-PWN, enables replay attacks in which a threat…
-
"Building Trust and Protecting Data to Support Kids in Iowa"Determining whether early childhood services should be improved or expanded needs good data, but obtaining that data is difficult when the entities providing resources and support to families with young children, such as federal and state departments,…
-
"NSA Issued an Advisory for System Administrators to use PowerShell for Detecting Malicious Activity"NSA recommends that system administrators use PowerShell to manage systems. The Windows program can detect and prevent hacking and other suspicious activity. This tool with its inherent security features can be helpful to admins trying to defend systems…
News