News
  • "Cyber Actors Using 'Password Spraying' Against Organisations' Email Systems"
    The U.S. Department of Homeland Security and FBI has warned of the use of a technique called password spraying to infiltrate the systems of American and foreign companies. Password spraying is a brute force attack method discovered to be used by a…
  • "As Predicted, More Branch Prediction Processor Attacks Are Discovered"
    A new branch prediction processor attack has been revealed by researchers from the College of William and Mary, Carnegie Mellon, the University of California Riverside, and Binghamton University. The new attack dubbed BranchScope is similar to the second…
  • "Cyber-Terrorism Set to Be Top Threat by 2020"
    Information Security Forum’s (ISF) annual Threat Horizon report suggests that nation-state-led cyber terrorism will become a greater threat to organizations by 2020. According to the Threat Horizon 2020 report, critical national infrastructure will…
  • "NIST Targets APTs with Resilience Strategies"
    The National Institute of Standards and Technology (NIST) has released a new draft publication called Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems. The latest draft publication guides…
  • "Brain-Like Computers Moving Closer to Cracking Codes"
    U.S. Army Research Laboratory scientists have demonstrated the use of neuromorphic computers to increase the speed of factoring large composite integers, which challenge the security of the RSA algorithm. Neuromorphic computers are brain-like computers…
  • "Top Cybersecurity Evasion and Exfiltration Techniques Used by Attackers"
    A report conducted by SS8 called the 2018 Threat Rewind Report, highlights the top techniques used by attackers to evade cybersecurity measures and exfiltrate data from networks. These techniques could be used by attackers to access and steal data from…
  • "Symantec: Look for Cryptojacking to Tie into IoT Devices"
    According to Symantec's newest yearly report, there is expected to be an increase of unauthorized cryptomining via IoT devices as cryptojacking attacks and IoT attacks have grown significantly in 2017. Although IoT devices have less processing power for…
  • "Exposed: The Path of Ransomware Payments"
    A new study led by cybersecurity researcher at NYU Tandon, Damon McCoy, reveals details pertaining to the ransomware payment ecosystem. Key findings of the study highlight those that are most impacted by ransomware campaigns, which bitcoin exchange…
  • Pub Crawl #15
     
  • Cyber Scene #19 - The Russians: Vlad the Cyber Impaler
    Cyber Scene #19 The Russians: Vlad the Cyber Impaler
  • "To Better Protect Themselves, Universities Partner on Cybersecurity"
    A partnership has been made between Indiana University and four other Big Ten institutions in support of improving upon the detection and monitoring of cyber threats, as well as the sharing of information pertaining to such threats. OmniSOC is a security…
  • "Researchers Find Leaky Apps That Put Privacy at Risk"
    Researchers have revealed security weaknesses contained by browser extensions, Android applications, and Facebook's advertisement system that pose a threat to the privacy of users. Although the Facebook advertisement system is not intended to reveal…