
Flaw in Grammarly’s extensions opened user accounts to compromise
A vulnerability in the Grammarly Chrome and Firefox extensions allowed websites to read users’ authentication tokes and use to them to log in to the users’ …

Cisco issues new, complete fixes for critical flaw in enterprise security appliances
Cisco researchers have identified additional attack vectors and features that are affected by the “perfect 10” remote code execution and denial of service …

Data and analytics maturity: Most organizations should be doing better
91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs …

8 trends in government tech for an enterprise-focused approach to IT
Deloitte examined emerging trends in government technology, and highlighted eight trends that are shaping strategic and operational transformations and redefining IT’s …

Mac crypto miner distributed via MacUpdate, other software download sites
Software download site/aggregator MacUpdate has been spotted delivering a new Mac crypto miner to users. A new Mac cryptominer was being distributed from hacked MacUpdate …

Investigation uncovers Luminosity Link RAT distributors, victims are in the thousands
A hacking tool allowing cybercriminals to remotely gain complete control over a victim’s computer is no longer available as a result of an UK-led operation targeting hackers …

About the Flash zero-day currently exploited in the wild
The zero-day Flash Player vulnerability (CVE-2018-4878) that Adobe warned about on Thursday was leveraged by North Korean hackers. FireEye calls the group TEMP.Reaper and …

The new gold rush: A look inside cryptocurrency fraud
Cybercriminals are flooding to the new world of cryptocurrencies looking to exploit the boom in interest and adoption of these electronic currencies, according to Digital …

Macro-less malware: The cyclical attack
Last year, attackers linked to the Russian hacking group APT28 (sometimes called Fancy Bear) started hacking like its 1999 with Microsoft Word-based malware that doesn’t …

Number of Internet-accessible ICS components is increasing every year
The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is …

Week in review: The future of smartphone security, automated cyber threat anticipation
Here’s an overview of some of last week’s most interesting news and articles: Authentication today: Moving beyond passwords A new global study from IBM Security …

Scammers steal nearly $1 million from Bee Token ICO would-be investors
Another day, another ICO-related scam. In an attack similar to that which fooled investors into the Enigma cryptocurrency investment platform, users who were aiming to buy Bee …