Vulnerability News

Hearing Isn’t Believing: The Rise of Voice Fraud

“Deep Fake” Technology is Behind The New Trend of AI-Assisted Fraud… An article review. It’s a scenario that probably happens far more often than we’d like to admit: an employee gets a phone call from a superior requesting they perform some task that ...

Four out of Five Schools Admit To Cybersecurity Incidents

Four out of five schools have experienced a cybersecurity incident… An article review. While it seems like these days every organization faces cybersecurity threats, as we’ve pointed out in the past schools are an increasingly attractive target to hackers—and a n...

Printers Remain a Significant Network Threat

Nearly 50 vulnerabilities were found in printers from the top six brands… An article review. You’re aware of phishing scams, you don’t open e-mail attachments you weren’t expecting to receive, your virus definitions are updated regularly and you don’t connect to ...

Subdomain Hijacking Attack Gives Hackers Access To Legitimate Sites

The attack hinges on a common mistake made by large organizations… An article review. When evaluating a suspicious link, you probably scrutinize the URL to make sure it’s the site you intended to go to—not one that is slightly misspelled or has a zero in place of...

Many School Districts Are Still Vulnerable To WannaCry

Years after patches were released, many systems remain vulnerable… An article review. While it has been over two years since the WannaCry exploit was publicly announced, a new report submitted by our own Sean Waugh says that hundreds of thousands of internet-conn...

Fiserv Sued Over Alleged Security Lapses

The nation’s largest core processor has been accused of multiple security lapses… An article review. For smaller banks and credit unions the resources needed to create and maintain their own online banking presence can be daunting. Even after the website is...

Asus Malware Highlights The Risk of Supply Chain Attacks

The malware was distributed through Asus’ own tool, and was signed with a valid certificate… An article review. When it comes to avoiding malware and other internet attacks, most users know you should avoid downloading files from unknown sources—but a recen...

Bitlocker Attack Puts Data At Risk

A simple $30 part and publicly available code allowed access to keys… An article review. Researchers recently announced a new successful attack against Bitlocker, a full-disk encryption tool that has built into Windows since Vista, and the attack is surprisingly ...

Sign-In Kiosks May Be Putting You At Risk

New research reveals issues with these commonly overlooked devices… An article review. With computers involved in our lives and businesses in so many ways, it can seem like we’re always being warned of another overlooked device that is ready to wreak havoc....

Microsoft Discontinues Support For SHA-1

Known to be vulnerable since 2005, the algorithm will be phased out over the next several months… An article review. Things can move slowly in the world of cryptography, and for evidence of that one needs to look no further than SHA-1–the hash algorithm int...