-
"Three Ways MITRE ATT&CK Can Improve Your Organizational Security"Ganesh Pai, the CEO of the security analytics company Uptycs, has outlined the different ways in which MITRE ATT&CK can help organizations improve their security. MITRE ATT&CK is an objective, third-party standard that security leaders and…
-
"With One Update, This Malicious Android App Hijacked Millions of Devices"Researchers at Malwarebytes have discovered that a popular barcode scanner app on Google Play was transformed into malware by adversaries. Lavabird Ltd.'s Barcode Scanner was an Android app available on Google's official app repository for years.…
-
"Machine Learning Algorithm May Be the Key to Timely, Inexpensive Cyber-Defense"Zero-day attacks on vulnerable computer networks and cyber-infrastructure can significantly overwhelm traditional defenses, leading to billions of dollars in damage and weeks of manual work to recover systems after they have been infiltrated. A team of…
-
"Web Application Attacks Grow Reliant on Automated Tools"A new report released by Barracuda Networks researchers shares findings from two months of attack data analysis. The findings reveal that cybercriminals have grown more reliant on the use of automated tools to perform their attacks. According to the…
-
"Plex Media Servers Are Being Abused For DDoS Attacks"Researchers at security firm Netscout have found that DDoS-for-hire services have found a way to abuse Plex Media servers to bounce junk traffic and amplify distributed denial of service (DDoS) attacks. The security researchers scanned the internet…
-
"Spotify Suffers Second Credential-Stuffing Cyberattack in 3 Months"Spotify is being affected by another credential-stuffing cyberattack, just three months after the last one. A researcher named Bob Diachenko on Thursday uncovered a malicious #Spotify logger database, with 100K+ account details (leaked elsewhere…
-
"A Coordinated Takedown Targets 'OGUser' Account Thieves"Instagram, TikTok, and Twitter have taken action against the hacker community called OGUsers, in which members buy and sell stolen social media accounts. Hackers affiliated with OGUsers were allegedly behind the attack faced by Twitter last year that…
-
"Agent Tesla Trojan Can Evade Endpoint Protection, Sophos Reports"Sophos researchers have reported the continued refinement of the Trojan called Agent Tesla. New evidence suggests that Agent Tesla is now capable of disabling endpoint protection. Agent Tesla emerged in 2014, spreading through spam emails with…
-
"Recent Sudo Vulnerability Affects Apple, Cisco Products"Researchers at the cybersecurity firm Qualys discovered a bug in the Sudo utility that affects Apple's macOS Big Sur operating system and multiple Cisco products. Administrators can use the Sudo utility to delegate root-level admin authority to specific…
-
"Microsoft Office 365 Attacks Sparked from Google Firebase"Researchers at Armorblox have discovered a savvy phishing campaign that manages to evade native Microsoft security defenses and is bent on stealing Microsoft login credentials. The phishing campaign is using Google Firebase to bypass email security…
-
"Disclosed ICS Vulnerabilities Surged During Second Half of 2020"Researchers at Claroty discovered that a substantial rise in industrial control system (ICS) vulnerabilities were disclosed in the second half of 2020. The research revealed a 33% increase in the number of disclosed ICS vulnerabilities than in the first…
-
"'Zoombombing' Research Shows Legitimate Meeting Attendees Cause Most Attacks"The rapid transition to remote working, learning, and more, due to the COVID-19 virus spread, has sparked an increase in the use of the videoconferencing app Zoom. However, the migration has led to multiple incidents of "Zoombombing" in which uninvited…
News