News
-
"Secure and Reliable Long-Term Storage to Outlast Humans"People should be able to securely store their digital information without fear of quantum or faster computers threatening safety. With funding from the National Science Foundation (NSF), computer science professors will use their innovative collaborative…
-
"Developing Cybersecurity Solutions for Industrial Infrastructures"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) reports that there are about 153,000 public drinking water systems and over 16,000 publicly owned wastewater treatment systems in the US. Therefore, a…
-
"CISA Announces Plans to Establish Logging Made Easy Service"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced plans to develop and establish the Logging Made Easy (LME) tool, a service that was initially created and maintained by the National Cyber…
-
"UK Warns of Russian Hackers Targeting Critical Infrastructure"The UK government’s intelligence and security arm recently issued an alert on Russian state-aligned threat actors aiming to conduct disruptive and destructive attacks against critical infrastructure in Western countries. The National Cyber Security…
-
"Critical Infrastructure Firms Concerned Over Insider Threat"Security researchers at Bridewell Consulting have discovered that over a third (35%) of critical national infrastructure (CNI) security leaders believe the economic downturn is forcing employees to turn to data theft and sabotage. The researchers…
-
"Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks"Fortra, the company developer of Cobalt Strike, is bringing further attention to the zero-day Remote Code Execution (RCE) flaw in its GoAnywhere MFT tool that ransomware actors are actively exploiting to steal sensitive data. The critical flaw, tracked…
-
"CISOs Struggling to Protect Sensitive Data Records"According to Rubrik, nearly all Information Technology (IT) and security leaders are concerned that their organization will be unable to maintain business continuity following a cyberattack. The complexity of data security is growing, and the number of…
-
"Microsoft SQL Servers Hacked to Deploy Trigona Ransomware"Hackers are infiltrating inadequately protected and Internet-exposed Microsoft SQL (MS-SQL) servers in order to deploy Trigona ransomware and encrypt all files. The MS-SQL servers are being compromised by brute-force or dictionary attacks that exploit…
-
"Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones"Researchers discovered that fitness apps such as Strava leak sensitive location information of users, even when they have used in-app features to specifically set up privacy zones to conceal their activity within specified areas. Two Ph.D. students from…
-
"Not All Encryption Is Created Equal"E2EE was proposed as an additional layer of encryption for the Global System for Mobile Communication and Terrestrial Trunked Radio mobile communications standards when the need and value of private and secure communications came of age. Nearly all…
-
"GitHub Launches Private Bug Reporting, Package Provenance Features"GitHub is launching a new feature that enables the collaboration between security researchers and developers in quickly and privately resolving vulnerability reports. The private vulnerability reporting channel makes it easier for researchers to submit…
-
"TAMU-CC Researchers Part of Cybersecurity Research Team Funded by $10M Department of Transportation Grant"Researchers continue to work toward realizing a future populated by autonomous vehicles, but the threat of cyberattacks is one of the most pressing issues to resolve. To address this critical issue, a new research team is exploring methods to mitigate…