Written By Shane Schick

POS Attacks Possible as Different Types of Malware Infect 4,000 ElasticSearch Servers

Kromtech Security found different types of malware that infected more than 4,000 ElasticSearch servers. Other security experts found additional risks.

Scientists Show How Speech Recognition Software Can Be Compromised via Ultrasounds

Through a DolphinAttack experiment, a group of researchers from China discovered an easy way to compromise speech recognition software.

Insider Threats Account for Nearly 75 Percent of Security Breach Incidents

Several recent studies confirmed that a security breach is often caused by an insider threat, including rogue employees or human error.

Cybercriminals Could Easily Take Over Industrial Cobots, Researchers Warn

Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.

ROPEMAKER Exploit Could Allow Fraudsters to Alter Emails Post-Delivery

A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.

Pulse Wave Techniques Allow Cybercriminals to Quickly Ramp Up DDoS Attacks

The traditional slow crescendo of malicious traffic in DDoS attacks is being replaced by a technique that hits organizations in multiple places at once.

Ex-MI5 Leader Advocates for Strong Encryption to Stave Off Cybersecurity Attacks

Former MI5 chief Jonathan Evans told BBC Radio 4 that cybersecurity must be factored in along with counterterrorism in protecting British citizens.

Researchers Show Danger of DNA Data Paired With Malware-Infected Strand

Researchers found an often overlooked vulnerability in DNA data. While uncommon, malicious code injection into synthetic DNA could be a credible threat.

GitPwnd Shows How Threat Actors Could Hijack Git Repositories in Software Development

Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.

TrickBot Learns From WannaCry and Petya by Adding Self-Spreading Worm Module

Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.