News
-
"WVU Officials Explain, Respond to Data Breach"West Virginia University has recently advised the campus community that a data breach has occurred, but officials said only a limited number of people and their personal information were compromised. Officials learned last November 25 that a…
-
"EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems"The US Environmental Protection Agency (EPA) is releasing a memorandum emphasizing the need for states to assess cybersecurity risks at Public Water Systems (PWSs) in order to protect public drinking water. Although some PWSs have tried to improve their…
-
"Satellites and Space Cybersecurity Course Helps Students Explore Concepts, Tools to Keep Space Systems, Vehicles Secure"Satellites and Space Cybersecurity, a first-year course in the Information Security and Intelligence program at Ferris State University, is a major work in progress supporting cybersecurity and data science. The course will cover multiple parts of the…
-
"Hackers Steal Gun Owners' Data from Firearm Auction Website"A website that facilitates the purchase and sale of guns has been compromised by hackers, exposing the identity of its customers. The hack exposed sensitive personal information belonging to more than 550,000 users. The exposed data includes full names,…
-
"DISA Announces Successful Completion of Thunderdome Zero-Trust Prototype"The Defense Information Systems Agency (DISA) has announced that its Thunderdome prototype has been successfully completed. DISA has been developing and implementing a zero-trust network access architecture. This architecture will strengthen the networks…
-
"Over 71k Impacted by Credential Stuffing Attacks on Chick-fil-A Accounts"American fast food restaurant chain Chick-fil-A has started notifying roughly 71,000 individuals that their user accounts have been compromised in a two-month-long credential stuffing campaign. The company said that following a careful…
-
"At Least 30% of 'Cyber-Criminals' Are Women: Report"According to a news study by Trend Micro, female participation in cybercrime is far higher than any other type of crime. The researchers used the machine learning web service Gender Analyzer V5 to analyze text written by 50 random users of the…
-
"A Key Post-quantum Algorithm May Be Vulnerable to Side-Channel Attacks"Quantum computers have the potential to break today's cryptographic algorithms. Therefore, post-quantum cryptographic algorithms must be so robust that they can withstand massive increases in computing power. However, according to researchers at the KTH…
-
"Royal Ransomware Demand Victims for up to $11 Million – CISA"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) reported that cybercriminals attacked US and foreign companies using a variant of the Royal ransomware. Once the threat actor infiltrates the target's system,…
-
"Vulnerabilities of Years past Haunt Organizations, Aid Attackers"According to Tenable, known vulnerabilities, or those for which patches are already available, are the leading vector for cyberattacks. The Tenable report categorizes important vulnerability data and analyzes attacker behavior to help organizations in…
-
"Chinese Hackers Use New Custom Backdoor to Evade Detection"The Chinese cyber espionage hacker group known as Mustang Panda was observed delivering a new custom backdoor called 'MQsTTang.' Mustang Panda is an Advanced Persistent Threat (APT) group known to target enterprises globally with data theft attacks…
-
"Sale of Stolen Credentials and Initial Access Dominate Dark Web Markets"The cybercrime economy centered on access to compromised systems, services, and networks has developed significantly over the past year, with a six-fold increase in the number of credentials stolen by cybercriminals via malware and made available for…