14 Jun 2019

Millions of Email Servers at Risk from Cryptomining Worm

Cybereason warns that threat actors have started to exploit a recently patched critical vulnerability that still affects over 3.5 million Exim email servers around the globe. The researchers have spotted two campaigns. In the first, threat actors were using a command and control (C2) server to target vulnerable devices with

Read More
14 Jun 2019

The gaming community is a rising target for credential stuffing attacks

An extensive Akamai report on the state of Internet security highlights the growing cyber threat for gamers. According to the study, gaming websites were the target of around 12 billion credential stuffing attacks between (November 2017 and March 2019. In a credential stuffing attack, a threat actor uses leaked or

Read More
14 Jun 2019

Ransomware rebounding in popularity as cryptojacking loses steam

Ransomware campaigns surged by 167% between Q4 of last year and the first three months of 2019, new research by Positive Technologies shows. Ransomware now accounts for 24% of all cyberattacks, up from 9% in Q4 of 2018. The resurgence of ransomware coincides with a drop in cryptojacking, i.e. the

Read More
14 Jun 2019

The Active Cyber Defense Bill is Back on the Table

On Thursday US Congressman Tom Graves, R-Ga. reintroduced the Active Cyber Defense Bill, which was first drafted in 2017 and has since then become known as the ‘hacking back’ bill as it would allow US cybersecurity officials to engage in certain types of offensive operations against threat actors. Experts are

Read More
14 Jun 2019

Experts: Spy used AI-generated face to connect with targets

Research by the Associated Press has uncovered what seems to have been a state-run espionage campaign centering on a fake LinkedIn profile that managed to connect with various influential people in Washington. Moreover, experts believe that the people behind the campaign used artificial intelligence (AI) to generate the profile picture

Read More
14 Jun 2019

Evernote Critical Flaw Opened Personal Data of Millions to Attack

Gaurdio researchers recently uncovered a major cross site scripting (XSS) flaw in the Chrome extension for the popular note-taking app Evernote. The vulnerability made it possible for threat actors to steal highly sensitive data belonging to more than 4.6 million users. By exploiting the flaw, attackers could obtain unauthorized “access

Read More
14 Jun 2019

DNS Firewalls Could Save Companies Billions

New research by the Global Cyber Alliance (GCA) shows that almost one-third of all cybercrime-related losses could be prevented if companies invested more in DNS protection. In the US, the use of DNS firewalls could allow organizations to reduce losses resulting from cyberattacks by between $19 billion and $37 billion.

Read More
14 Jun 2019

Hospital medical equipment contains potentially lethal vulnerability

Security researchers at CyberMDX have uncovered a highly dangerous vulnerability in the Alaris Gateway Workstation produced by BD. The vulnerable device is used in hospitals to “provide mounting, power, and communication support to infusion pumps,” which are used for “a wide range of therapies including fluid therapy, blood transfusions, chemotherapy,

Read More
13 Jun 2019

UK signs extradition request for Julian Assange

The UK government on Wednesday signed the US extradition request for Wikileaks founder Julian Assange, whose extradition trial will start on Friday. The US Department of Justice wants to prosecute Assange for 18 charges related to the illegal collection and distribution of classified information. Various journalists and analysts view the

Read More
13 Jun 2019

Organizations Investing More in ICS Cyber Security: SANS Study

New figures released by SANS indicate that cybersecurity investments aimed to protect industrial control systems (ICS) and operational technology (OT) are increasing. A little over half of organizations currently rate their risk profile as critical or high. This represents a significant decrease from the last report that was published in

Read More