News
-
"Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement"Extended Internet of Things devices (xIoT) are attractive to cyberattackers aiming to move laterally within enterprise networks and establish persistence. Such devices have everything the bad guys need to gain a foothold as xIoT devices are significantly…
-
"AI Tools Like ChatGPT Expected to Fuel BEC Attacks"Armorblox reports that 57 percent of all Business Email Compromise (BEC) attacks observed in the past year used language as the primary attack vector to reach unsuspecting employees. In addition, vendor compromise and fraud are increasing as a new attack…
-
"ODU Researchers Receive Grants to Address Maritime Cybersecurity Needs"The Coastal Virginia Center for Cybersecurity Innovation (COVA CCI), the Commonwealth Cyber Initiative (CCI) node for southeastern Virginia, has awarded $581,100 to seven maritime industry-focused cybersecurity research projects. Old Dominion University…
-
"The Quantum Security Era Is Coming – Here's How Leaders Can Prepare for It"Quantum computers promise transformative power for certain types of complex computational problems, such as advanced statical modeling in the financial sector, accelerated research and development for pharmaceutical companies, and a more efficient supply…
-
"What Are Passkeys? A Cybersecurity Researcher Explains How You Can Use Your Phone to Make Passwords a Thing of the Past"Passwords may soon become obsolete. However, the need for authentication and secure website access remains as strong as ever. Passkeys are digital credentials that are stored on a user's mobile device or computer. They are similar to actual keys. Access…
-
"LVHN: Sensitive Photos of Almost 2,800 Patients Potentially Stolen in Data Breach"Lehigh Valley Health Network (LVHN) has recently revealed that cybercriminals potentially stole sensitive photographs of as many as 2,760 patients during a data breach. LVHN announced in February that a cyberattack carried out by the Russian…
-
"LSU and US Secret Service Partner to Address Cyber Challenges for Louisiana, Nation"Louisiana State University (LSU) and the US Secret Service (USSS) have a formal agreement for the development of cyber technology and cyber talent, as well as for state and national security. The Memorandum of Understanding (MOU) strengthens interactions…
-
"Hackers Claim Vast Access to Western Digital Systems"The hackers who breached the data storage company Western Digital claim to have stolen about 10 terabytes of data, including large amounts of customer information. The extortionists are pressuring the company to negotiate a minimum eight-figure ransom in…
-
"Volume of Opaque Breach Notices Surges in Q1"According to the Identity Theft Resource Center (ITRC), the volume of US data breaches fell in Q1 2023, but the number of notices with no actionable information contained within grew by 20% from the previous quarter. The ITRC is a non-profit that…
-
"US-Based Company Debuts 'World's First Smart Gun' With Fingerprint Unlocking System"A US-based technology company has developed the first biometric smart gun. Biofire Technologies announced the handgun that is fingerprint and 3D infrared facial recognition-secured. It functions under various conditions, including when the user is…
-
"The Hacking of ChatGPT Is Just Getting Started"Alex Polyakov, CEO of the security company Adversa, only needed a couple of hours to break GPT-4. In March, when OpenAI released the latest version of its text-generating Artificial Intelligence (AI)-driven chatbot, Polyakov started entering prompts into…
-
"Siemens Metaverse Exposes Sensitive Corporate Data"Siemens Metaverse, a virtual space designed to replicate actual machines, factories, and other highly complex systems, has exposed sensitive information, including the company's office layouts and Internet of Things (IoT) devices. Siemens, a German…