Tor Weaponized to Steal Bitcoin

Tor Weaponized to Steal Bitcoin

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser. Criminals are using the Tor browser — long…

View More Tor Weaponized to Steal Bitcoin
Microsoft Tackles Election Security with Bug Bounties

Microsoft Tackles Election Security with Bug Bounties

As the 2020 presidential election draws closer and primary season looms around the corner, Microsoft has launched a bug-bounty program specifically aimed at its ElectionGuard…

View More Microsoft Tackles Election Security with Bug Bounties
China supported C919 airliner development through cyber espionage

China supported C919 airliner development through cyber espionage

Security researchers have correlated the activity of a Chinese hacker group known for targeting aerospace companies to a multi-year espionage effort by China’s intelligence agencies…

View More China supported C919 airliner development through cyber espionage
Feds Arrest International ATM Skimmer Ring

Feds Arrest International ATM Skimmer Ring

US law enforcement has arrested 18 alleged members of an international ATM criminal ring thought to be responsible for the theft of at least $20…

View More Feds Arrest International ATM Skimmer Ring
Imperva: Data Breach Caused by Cloud Misconfiguration

Imperva: Data Breach Caused by Cloud Misconfiguration

Imperva, the security vendor, said this week that a misconfiguration of an Amazon Web Services (AWS) cloud instance allowed hackers to exfiltrate information on customers…

View More Imperva: Data Breach Caused by Cloud Misconfiguration
Docker Vulnerability Opens Servers to Container Code

Docker Vulnerability Opens Servers to Container Code

Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE. A recently discovered…

View More Docker Vulnerability Opens Servers to Container Code
University to Create New Cybersecurity Approach Inspired by the Human Body

University to Create New Cybersecurity Approach Inspired by the Human Body

Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method, which is…

View More University to Create New Cybersecurity Approach Inspired by the Human Body
Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign

Hackers backed by the Iranian government recently tried to hack email accounts used by the campaign of a US presidential candidate, a Microsoft official said…

View More Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

With cybercriminals are taking less and less time to break into corporate systems, Asia-Pacific enterprises will have look to artificial intelligence (AI) and machine learning…

View More APAC firms will need AI as speed increasingly critical in cyberdefence
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Nation-state spy agencies are only as good as their operational security—the care they take to keep their digital spy operations from being discovered. But occasionally…

View More Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC