Skip to main content

News and Alerts

NEWS

How to Prevent Account Takeovers in 2021
Dave Stewart, Approov CEO, lays out six best practices for o...
Gamers Beware: Malware Hunts Steam, Epic and EA Origin Accounts
The BloodyStealer trojan helps cyberattackers go after in-ga...
SAS 2021: FinSpy Surveillance Kit Re-Emerges Stronger Than Ever
A 'nearly impossible to analyze' version of the malware spor...
Working Exploit Is Out for VMware vCenter CVE-2021-22005 Flaw
UPDATE: Indicators of compromise are now available. The unre...
SolarWinds Attackers Hit Active Directory Servers with FoggyWeb Backdoor
Microsoft is warning that the Nobelium APT is compromising s...

from threatpost.com - see more


Apple AirTag Bug Enables ‘Good Samaritan’ Attack
The new $30 Airtag tracking device from Apple has a feature ...
Indictment, Lawsuits Revive Trump-Alfa Bank Story
In October 2016, media outlets reported that data collected ...
Does Your Organization Have a Security.txt File?
It happens all the time: Organizations get hacked because th...
Trial Ends in Guilty Verdict for DDoS-for-Hire Boss
A jury in California today reached a guilty verdict in the t...
Customer Care Giant TTEC Hit By Ransomware
TTEC, [NASDAQ: TTEC], a company used by some of the world's ...

from krebsonsecurity.com - see more


ALERTS

Robot Motion Servers
This Alert contains a public report of a Remote Code Executi...
SweynTooth Vulnerabilities
This ALERT details vulnerabilities in SweynTooth's Blue...
Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU (Update A)
This updated alert is a follow-up to the original alert titl...
CAN Bus Network Implementation in Avionics
CISA is aware of a public report of insecure implementation ...
DICOM Standard in Medical Devices
NCCIC is aware of a public report of a vulnerability in the ...
Meltdown and Spectre Vulnerabilities (Update J)
This updated alert is a follow-up to the updated alert title...
WAGO PFC200
NCCIC is aware of a public report of an improper authenticat...
Eaton ELCSoft Vulnerabilities
NCCIC/ICS-CERT is aware of a public report of buffer overflo...
CAN Bus Standard Vulnerability
NCCIC/ICS-CERT is aware of a public report of a vulnerabilit...
CRASHOVERRIDE Malware
CRASHOVERRIDE, aka, Industroyer, is the fourth family of mal...

from ics-cert.us-cert.gov - see more


AWARENESS

Smart Home Devices
Now adays most of us have numerous devices in our homes conn...
Fake News
Fake news is a false narrative that is published and promote...
Use Caution Opening Email Attachments
A common method cyber criminals use to hack into people's co...
Ransomware
Ransomware is a special type of malware. Once it infected yo...
Careers in Cybersecurity
Have you considered a career in cybersecurity? It is a fast-...

from Security Tip of The Day - see more


Contact

George Bailey
MS, CISSP, GCIH
Assistant Director, Cyber Services
(765) 494-7538
baileyga@purdue.edu
Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at tap@purdue.edu.