News
-
"Can AI Really Be Protected from Text-Based Attacks?"Microsoft's Bing Chat, an Artificial Intelligence (AI)-powered chatbot co-developed with OpenAI, was not available for long before users devised ways to break it. Users got it to declare love, threaten harm, and more by providing carefully crafted inputs…
-
"Researchers Looking Into Cybersecurity of Canada's Power, IoT Sectors"Researchers at a Quebec university are looking into how prepared power utilities are for cyberattacks, as well as the security of wireless industrial Internet-connected devices. Ottawa recently announced that it gave the University of Sherbrooke the…
-
Pub Crawl #71Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"Possible New Lazarus Group Backdoor Found"Researchers discovered a new payload delivered by the Wslink malware downloader and believe it is part of the toolset maintained and deployed by the Lazarus Group, which is associated with North Korea. ESET researchers found the Wslink loader in 2021,…
-
"Investment Scams Drive $9bn in Fraud in 2022"According to new data from the FTC, Americans lost $8.8bn to fraud last year, with investment scams ($3.8bn) being the biggest money-maker for fraudsters. The FTC stated that investment fraud had surged by over 100% from 2021 when the figure stood…
-
"Intel Paid Out Over $4.1 Million via Bug Bounty Program Since 2017"Intel has reported recently that it has paid out more than $4.1 million through its bug bounty program since its creation in 2017. Intel noted that, on average, between 2018 and 2021, they paid $800,000 through its bug bounty program each year for…
-
"Firms Who Pay Ransom Subsidise 10 New Attacks: Report"During a new study, security researchers at Trend Micro found that just 10% of ransomware victims pay their extorters, but those who do are effectively funding 6-10 new attacks. The researchers noted that those who did decide to pay the ransom…
-
"Hackers Could Try to Take over a Military Aircraft; Can a Cyber Shuffle Stop Them?"Many aircraft, spacecraft, and weapons systems contain an onboard computer network referred to as military standard 1553, sometimes known as MIL-STD-1553 or just 1553. The network is a tried-and-true protocol for enabling communications between systems…
-
"61 Percent of Americans Rely on Free Antivirus Programs"According to a new report on the antivirus industry from Security.org, nearly three-quarters of Americans strongly believe computers require antivirus to protect their devices, and 61 percent rely on free solutions such as Microsoft Defender. The…
-
"Hacked Russian Radio Stations Broadcast Fake Air Raid Warnings"Radio stations in multiple Russian cities were recently hacked to broadcast fake air raid warnings. Air raid alerts were heard in Belgorod, Kazan, Novosibirsk, Penza, Magnitogorsk, Ufa, Voronezh, Nizhny Novgorod, Tyumen, Izhevsk, and other cities,…
-
"11 Countries Take Part in Military Cyberwarfare Exercise"The biggest military cyberwarfare exercise in Western Europe recently took place in Estonia. A total of 34 teams from 11 countries took part in a live-fire cyber battle. Countries such as the US, UK, Japan, India, Italy, Estonia, Ukraine,…
-
"Popular IBM File Transfer Tool Vulnerable to Cyberattacks, CISA Says"According to the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the IBM Aspera Faspex file transfer tool, which many large organizations use, has a critical vulnerability that hackers are actively exploiting.…