
Threat hunting with MITRE ATT&CK and Wazuh
Threat hunting with MITRE ATT&CK and Wazuh Threat hunting is the process of looking for malicious activity and its artifacts in a computer system or network. Threat hunting is carried out intermittently in an environment regardless of whether or not threats have...

Android phone owner accidentally bypassed lock screen
Android phone owner accidentally bypassed lock screen Cybersecurity researcher David Schütz accidentally found a way to bypass the lock screen on his fully patched Google Pixel 6 and Pixel 5 smartphones, enabling anyone with physical access to the device to unlock it....

Seeed Studio Launches a Rugged Gadget Family for the Industrial Internet of Things
Seeed Studio Launches a Rugged Gadget Family Designed for the Industrial Internet of Things With passive cooling and isolated inputs and outputs, this DIN-rail mountable gadget can turn its hand to a range of tasks. Seeed Studio has announced the launch of a...

ALMA Astronomical Observatory Became a Target for a Cyberattack
ALMA Astronomical Observatory Became a Target for a Cyberattack Operations at the world's most expensive ground-based telescope, high in the Atacama Desert, remain disrupted. The Atacama Large Millimeter Array (ALMA) astronomical observatory in Chile became an...

Growth of Cybercrime Costs | Infographic
Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. At a growth rate of 15 percent year over year — cybercrime represents the greatest transfer of economic wealth in history. ...

Where does Cybersecurity End for Electric Utilities?
Where does Cybersecurity End for Electric Utilities? Across the energy sector and between various electric sector locations there are several assets and systems deemed “crown jewel assets” or “mission-critical systems”. Depending on who you ask, nearly every digital...

A Common Password List Accounts for Nearly All Cyberattacks
A Common Password List Accounts for Nearly All Cyberattacks Half of a million passwords from the RockYou2021 list account for 99.997% of all credential attacks against a variety of honeypots, suggesting attackers are just taking the easy road. Tens of millions of...

New Windows UEFI Rootkit Black Lotus Advertised on Underground Criminal Forums
New Windows UEFI Rootkit Black Lotus Advertised on Underground Criminal Forums Cybersecurity researcher Scott Scheferman reported that a new Windows UEFI rootkit, dubbed Black Lotus, is advertised on underground criminal forums. The powerful malware is offered for...

Defend Against Malicious Actors’ Game Plan | Infographic
'Control System Defense: Know the Opponent' - published by the National Security Agency and the Cybersecurity & Infrastructure Security Agency - breaks down the steps malicious actors take to compromise critical infrastructure control systems so that you can...