Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G users. Researchers at cybersecurity firm Positive Technologies Security have discovered several vulnerabilities in communication protocol GPRS Tunnelling Protocol (GTP), that is used by mobile network operators (MNOs). Threat actors could exploit these flaws to conduct several malicious activities against 4G/5G users. Read more >>>
While the age of Big Data has improved our lives in countless ways, there is seemingly an equal number of potential downsides. The exponential rate at which data volume is growing has spawned nonstop cyber-activity intent on using this data for illegal purposes. The danger couldn’t be more extreme – or more real: in today’s internet dominated world, someone seeking to steal sensitive, confidential or proprietary data no longer has to physically breach a facility. Read more >>>
Attackers have launched a phishing campaign on Cisco Webex using WHF and COVID-19 to instill a sense of urgency. Attackers use cloned graphics and formatting design to mimic automated SSL certificate error alerts on Cisco Webex that instruct the user to login and verify their credentials. The ThreatDNA team recommends employees take extra caution when clicking on suspicious URLs and ensure anti-virus and endpoint security solutions are up-to-date. Read more >>>
The FBI’s IC3, or its Internet Crime Complaint Center, has reported a major increase in received cybersecurity complaints each day, according to The Hill — who goes on to explain that the number of cybersecurity complaints went up from 1,000 complaints every day, to over 3,000 to 4,000 per day since the beginning of the COVID-19 pandemic. Read more >>>
When COVID-19 slammed into the US like a meteor, one corner of life most reshaped by the resulting shockwaves is how we work. Millions of Americans are now working from home for the first time in their lives. As critical as remote work has been to keeping countless businesses alive during the COVID-19 pandemic, it has also proven to be a boon for cyber criminals, who are taking advantage of remote workers’ naiveté and distance from their secure office environments Read more >>>