18 Nov 2019

A celebrity deepfake roundtable with Tom Cruise and Jeff Goldblum is as weird as it sounds

The film site Collider created a deepfake roundtable discussion between Robert Downey Jr., George Lucas, Tom Cruise, Evan McGregor, and Jeff Goldblum. In the video, a celebrity impersonator provides the base performance, and then the impersonators’ faces are overlaid with the celebrities’ using machine learning technology. Deepfake videos have been

Read More
18 Nov 2019

Attackers using WhatsApp MP4 video files vulnerability can remotely execute code

Last week a severe vulnerability in the WhatsApp messaging software was uncovered, allowing hackers to perform remote code execution attacks. Facebook reported that the bug is a stick-based buffer overflow problem that can be prompted by attackers sending .MP4 video files. The vulnerability can be exploited to conduct denial-of-service (DoS)

Read More
15 Nov 2019

New phishing email campaign impersonates US postal service to deliver malware

A report published on Thursday by Proofpoint states that a phishing campaign that has been targeting Europe has now been attacking the United States with the goal of spreading Trojan malware onto computers. The latest phishing attacks impersonate the US Postal Service and contain a Word document that, when opened,

Read More
15 Nov 2019

5,183 breaches from the first nine months of 2019 exposed 7.9 billion records

According to a report released by Risk Based Security, Q3 2019 saw a 33.3% increase in security breaches when compared to Q3 of 2018. 5,183 breaches have been reported in 2019 so far. Risk Based Security claims that 2019 has been the worst year in terms of data privacy breaches,

Read More
14 Nov 2019

Gaping ‘hole’ in Qualcomm’s Secure World mobile vault leaked sensitive data

A hole found in the Qualcomm Secure World virtual processor that could be exploited to leak financial information has been patched and disclosed by researchers. Cybersecurity researchers at Check Point conducted a four-month study and concluded that it is not impossible to crack the Secure World operating system through fuzzing

Read More
14 Nov 2019

Healthcare Malware Infections Soar 60% from 2018

Malwarebytes recently released a statement claiming that ransomware attacks on healthcare organizations (HCO) has increased by 60% since 2018. HCOs are increasingly the targets of attack due to the large number of endpoints and connected devices within the HCO networks, offering an extensive attack surface. Cybersecurity in HCOs are typically

Read More
14 Nov 2019

Biggest Threats and Data: 2019 AR Threats Report

CDC recently released the 2019 AR Threats Report, which aims to highlight emerging threats to public health, drug-resistant bacterias becoming more common, and provide the latest information on data regarding the number of cases within the U.S. The report stated that Clostridiodes difficile affected 223,900 people in 2017, killing 12,800

Read More
14 Nov 2019

Don’t Rush Quantum-Proof Encryption, Warns NSA Research Director

Mathematician Peter Shor created the Shor Algorithm in 1994, an algorithm that can crack codes that are used by banks, e-commerce platforms, and intelligence agencies, but the code can only run on quantum computers. Years later, quantum computers still have not been developed enough to task them with breaking public-key

Read More
14 Nov 2019

This unusual new ransomware is going after servers

An unusual ransomware named PureLocker by cybersecurity analysts has been targeting enterprise servers. PureLocker is written in PureBasic, which easily targets different platforms as it is transferable between Linux, OS-X, and Windows. Attacks are launched against the targets, holding them hostage until cryptocurrency ransom is paid; often hundreds of thousands

Read More
14 Nov 2019

Microsoft Patches RCE Bug Actively Under Attack

Microsoft has patched 74 bugs, one under active attack, as part of the Patch Tuesday security roundup. In Internet Explorer, the previously vulnerable Microsoft bug allows attackers to execute rogue code if a user opens a malicious web page of Office document, permitting the attacker to gain control of the

Read More