Technology

New Attack Could Let Hackers Clone Your Google Titan 2FA Security Keys

Hardware security keys—such as those from Google and Yubico—are considered the most secure means to protect accounts from phishing and takeover attacks. But a new research published on Thursday demonstrates how an adversary in possession of such a two-factor authentication (2FA) device can clone it by exploiting an electromagnetic side-channel in the chip embedded in […]

New Attack Could Let Hackers Clone Your Google Titan 2FA Security Keys Read More »

Creating A Strong Password Policy With Specops and NIST Guidelines

End-user passwords are one of the weakest components of your overall security protocols. Most users tend to reuse passwords across work and personal accounts. They may also choose relatively weak passwords that satisfy company password policies but can be easily guessed or brute-forced. Your users may also inadvertently use breached passwords for their corporate account password. The National

Creating A Strong Password Policy With Specops and NIST Guidelines Read More »

SolarWinds Hackers Also Accessed U.S. Justice Department’s Email Server

The U.S. Department of Justice on Wednesday became the latest government agency in the country to admit its internal network was compromised as part of the SolarWinds supply chain attack. “On December 24, 2020, the Department of Justice’s Office of the Chief Information Officer (OCIO) learned of previously unknown malicious activity linked to the global

SolarWinds Hackers Also Accessed U.S. Justice Department’s Email Server Read More »

WhatsApp Will Delete Your Account If You Don’t Agree Sharing Data With Facebook

“Respect for your privacy is coded into our DNA,” opens WhatsApp’s privacy policy. “Since we started WhatsApp, we’ve aspired to build our Services with a set of strong privacy principles in mind.” But come February 8, 2021, this opening statement will no longer find a place in the policy. The Facebook-owned messaging service is alerting users

WhatsApp Will Delete Your Account If You Don’t Agree Sharing Data With Facebook Read More »

Hackers Using Fake Trump’s Scandal Video to Spread QNode Malware

Cybesecurity researchers today revealed a new malspam campaign that distributes a remote access Trojan (RAT) by purporting to contain a sex scandal video of U.S. President Donald Trump. The emails, which carry with the subject line “GOOD LOAN OFFER!!,” come attached with a Java archive (JAR) file called “TRUMP_SEX_SCANDAL_VIDEO.jar,” which, when downloaded, installs Qua or

Hackers Using Fake Trump’s Scandal Video to Spread QNode Malware Read More »

FBI, CISA, NSA Officially Blame Russia for SolarWinds Cyber Attack

The U.S. government on Tuesday formally pointed fingers at the Russian government for orchestrating the massive SolarWinds supply chain attack that came to light early last month. “This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government

FBI, CISA, NSA Officially Blame Russia for SolarWinds Cyber Attack Read More »

Healthcare Industry Witnessed 45% Spike in Cyber Attacks Since Nov 20

Cyberattacks targeting healthcare organizations have spiked by 45% since November 2020 as COVID-19 cases continue to increase globally. According to a new report published by Check Point Research today and shared with The Hacker News, this increase has made the sector the most targeted industry by cybercriminals when compared to an overall 22% increase in

Healthcare Industry Witnessed 45% Spike in Cyber Attacks Since Nov 20 Read More »

Warning: Cross-Platform ElectroRAT Malware Targeting Cryptocurrency Users

Cybersecurity researchers today revealed a wide-ranging scam targeting cryptocurrency users that began as early as January last year to distribute trojanized applications to install a previously undetected remote access tool on target systems. Called ElectroRAT by Intezer, the RAT is written from ground-up in Golang and designed to target multiple operating systems such as Windows,

Warning: Cross-Platform ElectroRAT Malware Targeting Cryptocurrency Users Read More »

Google Speech-to-Text API Can Help Attackers Easily Bypass Google reCAPTCHA

A three-year-old attack technique to bypass Google’s audio reCAPTCHA by using its own Speech-to-Text API has been found to still work with 97% accuracy. Researcher Nikolai Tschacher disclosed his findings in a proof-of-concept (PoC) of the attack on January 2. “The idea of the attack is very simple: You grab the MP3 file of the

Google Speech-to-Text API Can Help Attackers Easily Bypass Google reCAPTCHA Read More »

British Court Rejects U.S. Request to Extradite WikiLeaks’ Julian Assange

A British court has rejected the U.S. government’s request to extradite Wikileaks founder Julian Assange to the country on charges pertaining to illegally obtaining and sharing classified material related to national security. In a hearing at Westminster Magistrates’ Court today, Judge Vanessa Baraitser denied the extradition on the grounds that Assange is a suicide risk

British Court Rejects U.S. Request to Extradite WikiLeaks’ Julian Assange Read More »