News
-
"White House Pushes for Mandatory Regulations, More Offensive Cyber Action under National Cyber Strategy"The White House has revealed its National Cybersecurity Strategy, outlining a comprehensive plan for enhancing digital security nationwide. The plan is based on five pillars: minimum cybersecurity requirements for critical infrastructure, offensive cyber…
-
"WH Smith Discloses Cyberattack, Company Data Theft"British high street chain WH Smith has revealed recently that it was hit by a cyberattack that resulted in the theft of company data. In particular, the stationery and book chain said current and former employee data was accessed by the threat…
-
"Iron Tiger Hackers Create Linux Version of Their Custom Malware"The APT27 hacking group, also known as "Iron Tiger," has developed a new Linux version of its SysUpdate custom remote access malware, enabling the Chinese cyber espionage group to target a wider range of enterprise-level services. According to a recent…
-
"Attackers Increasingly Using transfer.sh to Host Malicious Code"Redis is an open-source data structure store used as a distributed in-memory database, cache, and message broker. Redis servers are intended to be accessed only by trusted clients in trusted environments. However, they are often found to be accessible…
-
"Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPI"A malicious Python package uploaded to the Python Package Index (PyPI) was discovered to have a fully-functional information stealer and Remote Access Trojan (RAT). The package named "colourfool" was found by Kroll's Cyber Threat Intelligence team, who…
-
"Cyberattackers Double Down on Bypassing MFA"As companies increasingly require more robust security for their employees and customers, attackers are getting better at bypassing multi-factor authentication (MFA), resulting in steady compromises. While there are multiple ways to circumvent the…
-
"Fending off Cyberattacks on Collaborative Robots"For operation, productivity, and safety, collaborative robots (cobots) rely on Internet of Things (IoT) devices, telemetry data, software programming, and remote control. There is an opportunity for cyberattacks to use the vulnerabilities of IoT and…
-
Science of Security BAA for Virtual InstitutesThe National Security Agency on March 1 released a Broad Agency Announcement (BAA), which calls for research project proposals. These research projects are for foundational cybersecurity research. Additional details on the requirements and interesting…
-
"RIT Researchers to Create Serious Video Game for Infrastructure Resilience to Cyberattacks"Rochester Institute of Technology (RIT) researchers are developing a serious video game to help cities prepare for, prevent, and respond to cyberattacks. The Army Cyber Institute (ACI) at West Point awarded RIT a grant of over $600,000 and selected RIT…
-
"Google Workspace Adds Client-Side Encryption to Gmail and Calendar"Google has recently expanded client-side encryption (CSE) support to additional products in its Workspace suite. The security feature was already available on Drive, Docs, Slides, Sheets, and Meet. The company announced that CSE is now also…
-
"LSU Computer Science Faculty Furthering Research Into Smartphone Security"Many smartphone users unlock their devices using biometric data such as their fingerprint, face, and voice. In addition, they use this information to log into apps, make online purchases, pay bills, and more. However, the concern is whether this data can…
-
"Over 30 Percent of Mobile Users Encounter Phishing Attacks"Data from Lookout reveals that mobile phishing encounter rates reached an all-time high in 2022, with an average of over 30 percent of personal and enterprise users exposed to these attacks each quarter. Since 2021, mobile phishing has risen by almost 10…