-
"Data Breach at Georgia Health System"St. Joseph’s/Candler (SJ/C), one of the largest hospital systems in Savannah, became aware of suspicious network activity on the morning of June 17, 2021. A ransomware attack was confirmed, and steps were taken to limit its impact. SJ/C employees had to…
-
"City Ph.D. Researcher Develops a Smart-Car Identity and Access Management (IAM) System"Subhajit Bandopadhyay, a post-graduate student at City, University of London’s Institute for Cyber Security (ICS), is trying to address the vulnerability of smart cars to hacking and security breaches. Subhajit, under the supervision of Professor…
-
"Poly Network Hackers Potentially Stole $610 Million: Is Bitcoin Still Safe?"The Poly Network, specialized in cryptocurrency transfers on the Binance, Ethereum, and Polygon blockchains, has revealed that it had been hit with an attack in which assets were transferred to hackers. According to Poly Network, the hackers exploited a…
-
"At Least 30,000 Internet-Exposed Exchange Servers Vulnerable to ProxyShell Attacks"A series of vulnerabilities called ProxyShell impact at least 30,000 Internet-exposed Microsoft Exchange servers. The ProxyShell vulnerabilities can be chained for unauthenticated remote code execution, thus allowing an attacker to take over an Exchange…
-
"Chaos Malware Walks Line Between Ransomware and Wiper"Researchers at Trend Micro have discovered an under-construction malware called Chaos, which is being advertised on an underground forum as being available for testing. While it calls itself ransomware, an analysis revealed that it’s actually more of a…
-
"New Android Trojan Hijacks Social Media"Researchers at Zimperium have uncovered a new type of Android Trojan attack that spreads via social media hijacking. The new Android Trojan is codenamed FlyTrap and has hit at least 140 countries since March 2021 and has spread to over 10,000 victims…
-
"Fundamental Flaw in RNGs Affects Many IoT Devices"According to researchers Allan Cecil and Dan Petro from Bishop Fox, most modern Internet of Things (IoT) devices have flawed hardware-based Random Number Generators (RNGs). These RNGs have a fundamental flaw that weakens the security of the encryption…
-
"New 'Glowworm Attack' Recovers Audio From Devices' Power LEDs"Researchers at the Ben-Gurion University of the Negev have demonstrated a method for spying on electronic conversations. They released a new paper outlining a novel passive form of the TEMPEST attack called Glowworm. The Glowworm attack transforms minute…
-
"1M Stolen Credit Cards Hit Dark Web for Free"Researchers have discovered that threat actors have leaked 1 million stolen credit cards for free online as a way to promote a relatively new and increasingly popular cybercriminal site dedicated to selling payment card credentials. The cards were…
News