-
"'Capture' Your IoT Devices and Improve Their Security"Most cyberattacks on Internet of Things (IoT) devices are caused by misconfigurations or weak passwords. However, security researchers are concerned about the extensive use of third-party libraries (i.e., collections of code vendors might use in their…
-
"One of Every Four Companies Suffered at Least One Email Security Breach, Hornetsecurity Survey Finds"Hornetsecurity, a cloud email security provider, surveyed more than 420 businesses that use the Microsoft 365 platform in order to gain insight into how they handle email security in a more decentralized working environment. Results from the survey…
-
"Security Researchers Reveal Staggering Magnitude of ICS Vulnerabilities in 2021 as Cyber Attacks on Critical Infrastructure Increase"The third Biannual ICS Risk and Vulnerability Report released by the industrial cybersecurity company Claroty reveals a significant increase in the disclosure of ICS vulnerabilities in the first half of 2021 compared to the previous six months. Claroty's…
-
"Indiana Contact Tracing Data Breached"It has been discovered that nearly 750,000 residents of Indiana have been impacted by the data breach involving responses collected via the Hoosier State's COVID-19 online contact tracing survey. An unnamed vulnerability-hunting company discovered…
-
"Phishing Costs Surge to $15m Annually for US Organizations"The security vendor Proofpoint commissioned the Ponemon Institute to poll nearly 600 IT and IT security practitioners to compile its latest Cost of Phishing study. The researchers found that the average cost of phishing for large US organizations…
-
"Troubling New Disk-Level Encryption Ransomware Surfaces"A new ransomware variant dubbed DeepBlueMagic has been discovered by researchers at Heimdal Security. According to the researchers, DeepBlueMagic targets different disk drives on a target organization's servers instead of encrypting files on endpoint…
-
"Mandiant, CISA Urge ThroughTek Customers to Fix Software Bug in Millions of Baby Monitors, Cameras"Researchers at FireEye's threat intelligence and incident response unit Mandiant have discovered a software flaw that leaves millions of Internet of Things (IoT) devices vulnerable to remote attacks. Hackers could use this vulnerability to intercept…
-
"Devices From Many Vendors Can Be Hacked Remotely Due to Flaws in Realtek SDKs"Numerous Internet of Things (IoT) Systems may be exposed to remote hacker attacks because of vulnerabilities discovered in Software Development Kits (SDKs) provided by the Taiwan-based semiconductor company Realtek to device manufacturers. Researchers at…
-
"Colonial Pipeline Reportedly Admits Data Breach"Colonial Pipeline had reportedly admitted that nearly 6000 individuals might have had their personal information compromised by ransomware attackers when they struck earlier this year. The fuel pipeline operator, which was crippled by the attack in…
-
"Misconfigured Server Leaks US Terror Watchlist"Researchers a Comparitech have discovered that a secret watchlist of suspected terrorists maintained by the FBI was exposed online after a configuration error. The researchers found the Terrorist Screening Center (TSC) list on July 19, when the exposed…
-
"How Hackers Can Use Message Mirroring Apps to See All Your SMS Texts — And Bypass 2FA Security"The implementation of Two-Factor Authentication (2FA) has become a necessity as the use of usernames and passwords alone is not enough to securely access online services. 2FA provides an extra layer of security to the username/password system. Studies…
-
"Hackers Can 'Poison' Open-Source Code on the Internet"Researchers at Cornell Tech have discovered a new kind of online attack capable of manipulating natural-language modeling systems and circumventing known defenses. Code poisoning attacks can lead to consequences ranging from the modification of movie…
News