Social media abuse of plus-sized models encourages women to be more abusive, researchers find- Tempemail

Women are more likely to leave a negative comment on a social media image of a plus-sized model if the image has already received negative comments, a new study has found. Researchers conducted an experiment among 92 female Australian university students who were shown four Facebook photos of plus-sized models. Continue Reading

Researchers Propose Machine Learning-based Bluetooth Authentication Scheme – Tempemail

A group of academics has proposed a machine learning approach that uses authentic interactions between devices in Bluetooth networks as a foundation to handle device-to-device authentication reliably. Called “Verification of Interaction Authenticity” (aka VIA), the recurring authentication scheme aims to solve the problem of passive, continuous authentication and automatic deauthentication Continue Reading

Researchers Uncover FIN8’s New Backdoor Targeting Financial Institutions – Tempemail

A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely new backdoor on infected systems, indicating the operators are continuously retooling their malware arsenal to avoid detection and stay under the radar. The previously undocumented malware has been Continue Reading

Researchers Warn of 4 Emerging Ransomware Groups That Can Cause Havoc – Tempemail

Cybersecurity researchers on Tuesday took the wraps off four up-and-coming ransomware groups that could pose a serious threat to enterprises and critical infrastructure, as the ripple effect of a recent spurt in ransomware incidents show that attackers are growing more sophisticated and more profitable in extracting payouts from victims. “While Continue Reading

Researchers Detail Modus Operandi of ShinyHunters Cyber Crime Group – Tempemail

ShinyHunters, a notorious cybercriminal underground group that’s been on a data breach spree since last year, has been observed searching companies’ GitHub repository source code for vulnerabilities that can be abused to stage larger scale attacks, an analysis of the hackers’ modus operandi has revealed. “Primarily operating on Raid Forums, Continue Reading

Researchers Find New Evidence Linking Diavol Ransomware to TrickBot Gang – Tempemail

Cybersecurity researchers have disclosed details about an early development version of a nascent ransomware strain called Diavol that has been linked to threat actors behind the infamous TrickBot syndicate. The latest findings from IBM X-Force show that the ransomware sample shares similarities to other malware that has been attributed to Continue Reading

Social media trains people to be morally outraged, Yale researchers find- Tempemail

A high number of ‘likes’ or ‘shares’ on social media posts incentivizes people to become morally outraged, Yale researchers have found. “Social media’s incentives are changing the tone of our political conversations online,” said Yale’s William Brady, a postdoctoral researcher in the Yale Department of Psychology who worked with associate Continue Reading

Researchers Warn of Linux Cryptojacking Attackers Operating from Romania – Tempemail

A threat group likely based in Romania and active since at least 2020 has been behind an active cryptojacking campaign targeting Linux-based machines with a previously undocumented SSH brute-forcer written in Golang. Dubbed “Diicot brute,” the password cracking tool is alleged to be distributed via a software-as-a-service model, with each Continue Reading

China’s New Law Requires Researchers to Report All Zero-Day Bugs to Government – Tempemail

The Cyberspace Administration of China (CAC) has issued new stricter vulnerability disclosures regulations that mandate security researchers uncovering critical flaws in computer systems to mandatorily disclose them first-hand to the government authorities within two days of filing a report. The “Regulations on the Management of Network Product Security Vulnerability” are Continue Reading

Researchers Leak PoC Exploit for a Critical Windows RCE Vulnerability – Tempemail

A proof-of-concept (PoC) exploit related to a remote code execution vulnerability affecting Windows Print Spooler and patched by Microsoft earlier this month was briefly published online before being taken down. Identified as CVE-2021-1675, the security issue could grant remote attackers full control of vulnerable systems. Print Spooler manages the printing Continue Reading