News
-
"NIST Wants to Help Prevent Cyberattacks on the Water Sector"The National Institute of Standards and Technology (NIST) is working on its first-ever framework for water infrastructure cybersecurity. NIST's National Cybersecurity Center of Excellence wants input from technology vendors, water sector members, and…
-
"Hackers Steal Data of 45,000 New York City Students in MOVEit Breach"The New York City Department of Education (NYC DOE) recently discovered that hackers stole documents containing the sensitive personal information of up to 45,000 students from its MOVEit Transfer server. The managed file transfer (MFT) software…
-
"Twitter Celeb Hacker Jailed For Five Years"A Liverpool man has recently been handed a five-year jail term after a sophisticated hacking campaign in which he and others hijacked celebrity Twitter accounts in a bid to scam followers. Joseph O’Connor was extradited from Spain to the US on…
-
"Biden-Harris Administration Announces New NIST Public Working Group on AI"The US Secretary of Commerce, Gina Raimondo, recently announced that the National Institute of Standards and Technology (NIST) will launch a new public working group on Artificial Intelligence (AI) that will build on the success of the NIST AI Risk…
-
"US Authorities Seize BreachForums Domain"The US government has recently captured the surface web domains associated with notorious cybercrime marketplace BreachForums, despite the arrest of the site's owner months ago. It is currently unclear why it has taken three months to get to this…
-
"Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks""Volt Typhoon," a recently identified Chinese nation-state actor, has been observed to be active in the wild since at least mid-2020, with the hacking group linked to never-before-seen tradecraft aimed at maintaining remote access to targets. CrowdStrike…
-
"Deception Technologies Have a Maturity Problem"Deception technologies can provide a more effective method for detecting network attackers, but it is unclear how well security leaders understand their maturity and capabilities. Debi Ashenden, a cybersecurity professor at Adelaide University, described…
-
"Uncovering Attacker Tactics Through Cloud Honeypots"According to Orca Security, attackers typically discover exposed "secrets," or sensitive information that grants access to an enterprise cloud environment, in as little as two minutes and, in many cases, begin exploiting them almost immediately,…
-
"Trojanized Super Mario Game Used to Install Windows Malware"A trojanized installer for the popular Windows game "Super Mario 3: Mario Forever" has spread malware to unsuspecting players. Super Mario 3: Mario Forever is a free-to-play remake of the Nintendo game created by Buziol Games and released for Windows in…
-
"AI Technology for Safer Integrated Analysis of Data Held by Multiple Organizations"Improving the accuracy of Artificial Intelligence (AI) analysis requires collecting sufficient data without distribution bias. AI technology gathers data dispersed across multiple institutions. It must safely perform integrated analysis while keeping…
-
"Outsmarting Deepfake Video"In March 2022, a deepfake video showed Ukrainian President Volodymyr Zelenskyy ordering his people to lay down their weapons and surrender to Russia. The potential for malicious applications and the rapid evolution of deepfake techniques have ignited a…
-
"CyLab Announces First Round of Secure Blockchain Initiative Funded Project"The Secure Blockchain Initiative (SBI) of Carnegie Mellon University (CMU) has launched with the selection of six projects for its first round of seed funding. By conducting research, the SBI aims to revolutionize blockchain technology applied in…