14 Sep 2022

A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities

We have recently observed malicious actors exploiting both recently disclosed and older Oracle WebLogic Server vulnerabilities to deliver cryptocurrency-mining malware. Oracle WebLogic Server is typically used for developing and deploying high-traffic enterprise applications on cloud environments and engineered and conventional systems. One of the older vulnerabilities that is still being

Read More
05 Sep 2022

Unraveling How Cybercriminals Extort Businesses Worldwide

The paper, “An Anatomy of Crypto-Enabled Cybercrimes,” takes a detailed look at how highly sophisticated criminal organizations, mainly based in Russia and North Korea, extort money from corporations worldwide. The majority of these victimized firms are in the United States. “This was actually a difficult decision to do this paper because

Read More
29 Jun 2022

Blockchain not just for bitcoin: It can secure and store genomes, too

Blockchain is a digital technology that allows a secure and decentralized record of transactions that is increasingly used for everything from cryptocurrencies to artwork. But Yale researchers have found a new use for blockchain: they’ve leveraged the technology to give individuals control of their own genomes. Their findings are published June

Read More
21 Feb 2022

Here’s How Companies Plan to Take Advantage of The Metaverse

The beginning of the year was marked by a cascade of corporate announcements about their plans for the metaverse, the crypto sphere, and NFTs. Faced with the multitude of announcements, it is logical to wonder what is the business model behind it and especially if these are not simply smokescreens

Read More
15 Feb 2022

A whole new world: Education meets the metaverse

The metaverse is upon us. Soon it will be as omnipresent as TikTok, Instagram, and Facebook (now Meta). As technology advances to bring us new immersive and imaginary worlds, how we educate children and prepare teachers must also advance to meet these new opportunities. When education lags the digital leaps,

Read More
31 Jan 2022

The metaverse could be a serious problem for kids, experts say

If there’s one thing that tech companies, retailers, content creators and investors can agree on, it’s this: There’s plenty of money to be made from the metaverse. But as CEOs try to elbow past their rivals to gain a foothold in the still nascent digital space, some psychologists and mental health

Read More
06 Dec 2021

Analysis: users have spent $26.9B+ on NFTs in 2021 so far, most transactions are under $10,000, and CryptoPunks is the most popular collection with $3B sales

Non-fungible tokens (NFTs) have skyrocketed in popularity over the last year. NFTs are blockchain-based digital items whose units are designed to be unique, unlike traditional cryptocurrencies whose units are meant to be interchangeable. NFTs can store data on blockchains — with most NFT projects built on the Ethereum blockchain —

Read More
22 Nov 2021

Cryptocurrency leaders see exponential growth; banks embrace crypto as an asset class

Digital asset skeptics take note: Not only is cryptocurrency here to stay, but 90% of the global population is predicted to adopt it over the next decade, says one of the world’s leading crypto infrastructure developers. The current estimate of global cryptocurrency users is about 4%, or 300 million people. “This is

Read More
19 Oct 2021

Developing Artificial Intelligence That “Thinks” Like Humans

Creating human-like AI is about more than mimicking human behavior – technology must also be able to process information, or ‘think’, like humans too if it is to be fully relied upon. New research, published in the journal Patterns and led by the University of Glasgow’s School of Psychology and Neuroscience,

Read More
31 Aug 2021

LockFile Ransomware Uses Never-Before Seen Encryption to Avoid Detection

In July, researchers at Sophos discovered a new emerging threat in July that exploits the ProxyShell vulnerabilities in Microsoft Exchange servers to attack systems. The ransomware is referred to as LockFile and uses a unique intermittent encryption method as a means of evading detection. The ransomware gans also adopts tactics

Read More