Users can be manipulated to share private information online

Online users are more likely to reveal private information based on how website forms are structured to elicit data, Ben-Gurion University of the Negev (BGU) researchers have determined.
December 30, 2020

FBI: Pranksters are hijacking smart devices to live-stream swatting incidents

"Recently, offenders have been using victims' smart devices, including video and audio capable home surveillance devices, to carry out swatting attacks," the FBI said in a PSA published today.
December 7, 2020

Google publishes XS-Leaks to encourage research into new data-leaking website attacks

Google has set up a new site to track cross-site leaks, warning that these types of flaws are being used by some sites to steal information about the user or their data in other web applications.

Gootkit Trojan and REvil Ransomware Come Together to Stress Organizations

Gootkit Trojan and REvil Ransomware Come Together to Stress Organizations - Cybersecurity news - Emerging Threats
The Gootkit information-stealing Trojan has once again surfaced a year later joining REvil Ransomware in a new campaign to target WordPress sites in Germany.

Metasploit Framework: A Popular Tool among Cybercriminals

Metasploit Framework: A Popular Tool among Cybercriminals - Cybersecurity news - Emerging Threats
Security experts recently observed an interesting payload deployment using Metasploit against exposed Docker APIs. The framework has a significant advantage of combining any exploit with any payload.

QR Codes Serve Up a Menu of Security Concerns

Quick Response (QR) codes are booming in popularity and hackers are flocking to exploit the trend. As per a new study, people are mostly ignorant of how it can be used to launch digital attacks.

FBI and NSA Expose Drovorub Malware, APT28's Swiss-Army Knife For Hacking Linux

FBI and NSA Expose Drovorub Malware, APT28's Swiss-Army Knife For Hacking Linux - Cybersecurity news - Emerging Threats
The FBI and NSA have raised an alarm against Russia’s elite state-linked hacker group that is targeting Linux Kernel prior to version 3.7 with the new stealth Drovorub malware suite.

(Ether)Oops! - Ethernet-based Wired Networks at Risk

(Ether)Oops! - Ethernet-based Wired Networks at Risk - Cybersecurity news - Emerging Threats
Researchers explored a new attack method that helps an attacker infiltrate targeted networks via faulty Ethernet cables.

OilRig Now Uses DNS-over-HTTPS To Execute Attacks

OilRig Now Uses DNS-over-HTTPS To Execute Attacks - Cybersecurity news - Emerging Threats
An Iranian hacker group was spotted using the DNS-over-HTTPS (DoH) protocol to silently exfiltrate data from hacked networks.

New Risks With Exposed Elasticsearch and MongoDB - Users ‘Meowed’ Without Any Warning

New Risks With Exposed Elasticsearch and MongoDB - Users ‘Meowed’ Without Any Warning - Cybersecurity news - Emerging Threats
A hacker group is targeting unsecured MongoDB instances exposed to the internet, and deleting them without any warning.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags